A python polymorphic engine for C programs
☆11Dec 8, 2023Updated 2 years ago
Alternatives and similar repositories for Cycotic
Users that are interested in Cycotic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Sneak is URL transfer tool based on Tor and Curl.☆14Dec 6, 2018Updated 7 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆67Mar 6, 2026Updated 2 weeks ago
- ☆39Nov 25, 2025Updated 4 months ago
- A set of tools for collecting forensic information☆28Apr 4, 2020Updated 5 years ago
- ☆42Feb 18, 2025Updated last year
- ☆44Oct 16, 2023Updated 2 years ago
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool for running an application in an isolated network namespace, with external network access only through a SOCKS proxy.☆27Nov 8, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- ☆171Jul 27, 2024Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆139Apr 6, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- ☆50May 12, 2021Updated 4 years ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 8 months ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- CS Aim Assist☆21Oct 24, 2022Updated 3 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- ☆108Aug 21, 2024Updated last year
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- ☆100Sep 1, 2024Updated last year