vidner / morphLinks
Polymorphic ELF Runtime Crypter written in rust.
☆21Updated 4 years ago
Alternatives and similar repositories for morph
Users that are interested in morph are comparing it to the libraries listed below
Sorting:
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- ☆29Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Exploitable drivers, you know what I mean☆153Updated last month
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 5 months ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated 2 years ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- Read my blog for more info -☆32Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- ☆57Updated 3 years ago