pe_to_shellcode
Converts PE into a shellcode (by hasherezade)
nimcrypt
PE Crypter written in Nim (by icyguider)
pe_to_shellcode | nimcrypt | |
---|---|---|
4 | 1 | |
2,208 | 89 | |
- | - | |
3.8 | 10.0 | |
9 months ago | about 3 years ago | |
C++ | Nim | |
BSD 2-clause "Simplified" License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pe_to_shellcode
Posts with mentions or reviews of pe_to_shellcode.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-27.
-
Bypassing Windows Defender (10 Ways)
Finally, we also have the option to transform a native PE back to shellcode. This may be done, for example, via hasherezade's pe_to_shellcode tool.
- Petoshellcode - Converts PE into a shellcode
- pe_to_shellcode: Converts PE so that it can be then injected just like a normal shellcode. (At the same time, the output file remains to be a valid PE). Supports both 32 and 64 bit PEs
- Petoshellcode – Converts PE into a Shellcode
nimcrypt
Posts with mentions or reviews of nimcrypt.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-27.
-
Bypassing Windows Defender (10 Ways)
Moreover, a PE Crypter works by encrypting the executable's contents and generating an executable that will decrypt the original PE at runtime. This is very useful against AVs as most of them rely on static analysis instead of runtime behaviour (like EDRs). So completely hiding the content of an executable until runtime may be very effective, unless the AV has generated signatures against the Encrypting/Decrypting methods, which is the case from what I tried with nimpcrypt.
What are some alternatives?
When comparing pe_to_shellcode and nimcrypt you can also consider the following projects:
DripLoader - Evasive shellcode loader for bypassing event-based injection detection (PoC)
Alcatraz - x64 binary obfuscator
dll_to_exe - Converts a DLL into EXE
powershell
pypackerdetect - Packing detection tool for PE files
obfy - A tiny C++ obfuscation framework
donut - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
upx - UPX - the Ultimate Packer for eXecutables
pwntools - CTF framework and exploit development library
metame - metame is a metamorphic code engine for arbitrary executables
PowerSharpPack