From 5566085e47e96d2d02266d2cd592a16dc16932ee Mon Sep 17 00:00:00 2001 From: fabacab Date: Sat, 6 Feb 2021 08:27:10 -0500 Subject: [PATCH] Remove peCloak.py as its host now consistently returns HTTP 500 error. --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index 031ecf7..3f18373 100644 --- a/README.md +++ b/README.md @@ -114,7 +114,6 @@ See also [awesome-tor](https://github.com/ajvb/awesome-tor). * [Shellter](https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. * [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key. * [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions. -* [peCloak.py](https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/) - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection. * [peCloakCapstone](https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool. ## Books