C++ application that uses memory and code hooks to detect packers
-
Updated
Mar 12, 2016 - C++
C++ application that uses memory and code hooks to detect packers
Carbon Crypter / Packer
Implementation of process hollowing on x32 .
The RunPE program is written in C# to execute a specific executable file within another file's memory using the ProcessHollowing technique.
Delphi Process Hollowing, Updated.
Make "upx -d" unpacking impossible!
An implementation of the Process Hollowing technique.
Golang version of https://github.com/hasherezade/libpeconv
Lime Crypter Obfuscator Mod
Nim process hollowing loader
RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the API's i hook and to dump the memory while it is using RunPE/PH techniques.
Mystery Legacy Repo is for advanced penetration tools
execute a PE in the address space of another PE aka process hollowing
Software Protector
ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption
Simple protector to show how to run a payload without dropping it using RunPE Technique
Tool to evade Antivirus With Different Techniques
Add a description, image, and links to the runpe topic page so that developers can more easily learn about it.
To associate your repository with the runpe topic, visit your repo's landing page and select "manage topics."