load PE in memory Filelessly
-
Updated
Apr 28, 2024 - Python
load PE in memory Filelessly
The origami packer, with an updated stub that bypasses windows defender - All credited goes to dr4k0nia for creating the original program.
A fileless powershell-based ransomware malware program that encrypts files with AES and exfils key through discord webhook. Bypassing all antiviruses
A crypter that uses a bat file to run an executable in memory in the powershell process. Fully Undetected - Tested on ESET nod32, Kaspersky, windows defenders, 360 security, etc.
Add a description, image, and links to the fileless-malware topic page so that developers can more easily learn about it.
To associate your repository with the fileless-malware topic, visit your repo's landing page and select "manage topics."