A VBA implementation of the RunPE technique or how to bypass application whitelisting.
-
Updated
Dec 17, 2019 - VBA
A VBA implementation of the RunPE technique or how to bypass application whitelisting.
Demos of various injection techniques found in malware
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports payload-side
Tool to evade Antivirus With Different Techniques
A cracked version of a private Runtime&Scantime crypter with an updating stub, lifetime license
Cronos Crypter is an simple example of crypter created for educational purposes.
ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption
execute a PE in the address space of another PE aka process hollowing
Simple protector to show how to run a payload without dropping it using RunPE Technique
Mystery Legacy Repo is for advanced penetration tools
Golang version of https://github.com/hasherezade/libpeconv
Nim process hollowing loader
A famous XWorm RAT. ✨The price is 20$✨All the popular RAT options, please read the description
Lime Crypter Obfuscator Mod
Software Protector
Add a description, image, and links to the runpe topic page so that developers can more easily learn about it.
To associate your repository with the runpe topic, visit your repo's landing page and select "manage topics."