0xN3utr0n / NotemeView external linksLinks
ELF packer/crypter that aims to create hardened and stealthy troyans
☆58Dec 25, 2021Updated 4 years ago
Alternatives and similar repositories for Noteme
Users that are interested in Noteme are comparing it to the libraries listed below
Sorting:
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- A simple polymorphic engine☆44Aug 8, 2019Updated 6 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Jun 23, 2022Updated 3 years ago
- Yet Another ELF-Injector☆16Oct 12, 2019Updated 6 years ago
- Reflectively load PE☆105Aug 4, 2020Updated 5 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 7 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆129May 8, 2021Updated 4 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Encrypts 64-bit elf files that decrypt at runtime.☆37Mar 6, 2025Updated 11 months ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- Compilation of ELF Packers and ELF obfuscation / Anti-Debugging stuff☆21Nov 19, 2017Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 8, 2026Updated last week
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Oct 1, 2020Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Mar 8, 2019Updated 6 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- ☆11Sep 26, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago