PEzor

Malware obfuscator

A tool for obfuscating and packing executable files to evade antivirus detection and security measures

Open-Source Shellcode & PE Packer

GitHub

2k stars
42 watching
322 forks
Language: C
last commit: 10 months ago
Linked from 2 awesome lists

antivirus-evasionhacktoberfestredteamshellcode

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
bonnetn/vba-obfuscator A tool to protect VBA macros by obfuscating their code to evade antivirus signatures 150
hasherezade/mal_unpack A tool to unpack malicious code from packed executables using the PE-sieve technique. 657
phra/rustbuster A tool that uses web fuzzing and content discovery techniques to test websites for vulnerabilities 527
mrphrazer/obfuscation_detection Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. 575
samlarenn/pepacker A tool for encrypting and obfuscating .text sections of executable files. 49
secretsquirrel/recomposer A tool that alters binary files to make them more difficult to track online 130
packing-box/pypackerdetect Detects whether an executable is packed using various methods and signatures. 21
uppusaikiran/yara-finder Tools to detect and analyze malware using Yara rules 1
guelfoweb/peframe Analyzes Portable Executable malware and malicious MS Office documents for various suspicious features 610
fr0gger/yara-unprotect A collection of Yara rules for detecting malware evasion techniques and malicious activity. 25
cbhue/pyfuscation A Python script that obfuscates PowerShell scripts by replacing function names, variables, and parameters. 510
cyb3rmx/qu1cksc0pe A comprehensive tool for analyzing suspicious files and detecting malware characteristics. 1,320
hestat/lw-yara A Yara ruleset and scanner tool for detecting webserver malware on Linux servers. 102
joxeankoret/pyew A command-line tool for analyzing malware and disassembling binary files 383
xen0ph0n/yaragenerator Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. 332