wangda38 / vmShell_Protect
☆20Updated 2 years ago
Alternatives and similar repositories for vmShell_Protect:
Users that are interested in vmShell_Protect are comparing it to the libraries listed below
- 简单安排一下 autochk.sys 这个rootkit☆67Updated last year
- IDA Python script for generating Windows x86 shellcode with one click☆35Updated last year
- https://key08.com/index.php/2021/10/19/1375.html☆65Updated 2 years ago
- Session0注入: 用于实现对系统进程的远程线程注入☆11Updated last year
- Kill Protected Process Light Process (include av)☆55Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆81Updated 2 years ago
- ☆23Updated 2 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆54Updated 2 weeks ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆30Updated last year
- shellcode生成框架☆83Updated 6 months ago
- shadow tls☆17Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- ☆32Updated 4 years ago
- 通杀检测基于白文件patch黑代码的免杀技术的后门☆137Updated 5 months ago
- Hide Port In Windows☆38Updated 2 months ago
- Compile-Time Calls Obfuscator for C++14+☆37Updated last year
- 免杀计划 任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- 简单版的PE加载器☆12Updated 4 years ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆27Updated 8 months ago
- ☆22Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆39Updated 8 months ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear ”》☆119Updated 2 months ago
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- 白文件扫描器 非公开☆27Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆51Updated 10 months ago