Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.
☆25Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for Defanger
Users that are interested in Defanger are comparing it to the libraries listed below
Sorting:
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- ☆537Updated this week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Rust macro to embed encrypted files in compiled binary☆19Nov 16, 2022Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- ☆23May 23, 2024Updated last year
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- JITK - JIT Killer is hooker for clrjit☆30Jan 3, 2023Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Recon 2023 slides and code☆79Jun 9, 2023Updated 2 years ago
- Command Execution exploiter with an auto connection handling☆32Jun 15, 2022Updated 3 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- My Favorite Offensive Security Scripts☆85Apr 25, 2025Updated 10 months ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Stream any content(uncensored) from torrents to your machine without downloading the file!☆10Jun 4, 2021Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Do some DLL SideLoading magic☆90Sep 20, 2023Updated 2 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- ☆84Aug 18, 2022Updated 3 years ago