vxlabinfo / SignFinderLinks
Tool for easy clean PE32 from AV signature
☆27Updated 9 years ago
Alternatives and similar repositories for SignFinder
Users that are interested in SignFinder are comparing it to the libraries listed below
Sorting:
- ☆28Updated 9 years ago
- A "tiny" meterpreter stager☆127Updated 6 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆120Updated 8 years ago
- PoC dlls for Task Scheduler COM Hijacking☆95Updated 9 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Power Loader botnet☆42Updated 10 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- Platform independent peCloak fork based on Capstone☆108Updated 9 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆217Updated 5 years ago
- Simple runtime crypter in C++.☆43Updated 11 years ago
- Passive UAC elevation using dll infection☆76Updated 11 years ago
- ☆89Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- Carberp Banking Trojan☆125Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Updated 9 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆125Updated 3 years ago
- Various Crypter Project☆54Updated 11 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 5 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- ☆25Updated 13 years ago
- medium-rare☆28Updated 6 years ago
- Example application for creating multiple desktops on Windows☆139Updated 7 years ago
- Fake msxfs.dll to debug ATM trojans☆55Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago