Dewera/Lunar
A lightweight native DLL mapping library that supports mapping directly from memory
Language: C#
#dll_injection #pe_loader #reverse_engineering
Stars: 68 Issues: 0 Forks: 8
https://github.com/Dewera/Lunar
A lightweight native DLL mapping library that supports mapping directly from memory
Language: C#
#dll_injection #pe_loader #reverse_engineering
Stars: 68 Issues: 0 Forks: 8
https://github.com/Dewera/Lunar
GitHub
GitHub - Dewera/Lunar: A lightweight native DLL mapping library that supports mapping directly from memory
A lightweight native DLL mapping library that supports mapping directly from memory - Dewera/Lunar
hasherezade/transacted_hollowing
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Language: C
#pefile #malware #code_injection #pe_injector
Stars: 142 Issues: 0 Forks: 16
https://github.com/hasherezade/transacted_hollowing
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Language: C
#pefile #malware #code_injection #pe_injector
Stars: 142 Issues: 0 Forks: 16
https://github.com/hasherezade/transacted_hollowing
GitHub
GitHub - hasherezade/transacted_hollowing: Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and…
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging - hasherezade/transacted_hollowing
hasherezade/process_ghosting
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Language: C
#pefile #pe_injector #pe_injection
Stars: 120 Issues: 3 Forks: 24
https://github.com/hasherezade/process_ghosting
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Language: C
#pefile #pe_injector #pe_injection
Stars: 120 Issues: 3 Forks: 24
https://github.com/hasherezade/process_ghosting
GitHub
GitHub - hasherezade/process_ghosting: Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using…
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file - hasherezade/process_ghosting
hasherezade/pe-bear
Portable Executable reversing tool with a friendly GUI
Language: C++
#pe_analyzer #pe_analyzer_gui #pe_editor #pe_file #pe_format
Stars: 617 Issues: 1 Forks: 41
https://github.com/hasherezade/pe-bear
Portable Executable reversing tool with a friendly GUI
Language: C++
#pe_analyzer #pe_analyzer_gui #pe_editor #pe_file #pe_format
Stars: 617 Issues: 1 Forks: 41
https://github.com/hasherezade/pe-bear
GitHub
GitHub - hasherezade/pe-bear: Portable Executable reversing tool with a friendly GUI
Portable Executable reversing tool with a friendly GUI - GitHub - hasherezade/pe-bear: Portable Executable reversing tool with a friendly GUI
ORCx41/AtomPePacker
A Highly capable Pe Packer
Language: C
#edr_bypass #packer #pe
Stars: 222 Issues: 1 Forks: 39
https://github.com/ORCx41/AtomPePacker
A Highly capable Pe Packer
Language: C
#edr_bypass #packer #pe
Stars: 222 Issues: 1 Forks: 39
https://github.com/ORCx41/AtomPePacker
GitHub
GitHub - NUL0x4C/AtomPePacker: A Highly capable Pe Packer
A Highly capable Pe Packer. Contribute to NUL0x4C/AtomPePacker development by creating an account on GitHub.
fortra/No-Consolation
A BOF that runs unmanaged PEs inline
Language: C
#bof #cna #cobalt_strike #pe_loader
Stars: 214 Issues: 0 Forks: 24
https://github.com/fortra/No-Consolation
A BOF that runs unmanaged PEs inline
Language: C
#bof #cna #cobalt_strike #pe_loader
Stars: 214 Issues: 0 Forks: 24
https://github.com/fortra/No-Consolation
GitHub
GitHub - fortra/No-Consolation: A BOF that runs unmanaged PEs inline
A BOF that runs unmanaged PEs inline . Contribute to fortra/No-Consolation development by creating an account on GitHub.
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
GitHub
GitHub - DosX-dev/Astral-PE: Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64) - DosX-dev/Astral-PE