vidner / morphLinks
Polymorphic ELF Runtime Crypter written in rust.
☆21Updated 4 years ago
Alternatives and similar repositories for morph
Users that are interested in morph are comparing it to the libraries listed below
Sorting:
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- ☆28Updated 2 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- Compile shellcode into an exe file from Windows or Linux.☆69Updated 2 months ago
- ☆55Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆73Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- ☆74Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- A dynamic unpacking tool☆140Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 4 months ago
- Read my blog for more info -☆31Updated 4 years ago
- QLoader is a PE loader creator that helps you quickly create a non-exe loader for application☆107Updated 10 months ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year