0xb11a1 / yetAnotherObfuscatorLinks
C# obfuscator that bypass windows defender
☆734Updated 2 years ago
Alternatives and similar repositories for yetAnotherObfuscator
Users that are interested in yetAnotherObfuscator are comparing it to the libraries listed below
Sorting:
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆445Updated 7 months ago
- C# tool for UAC bypasses☆436Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆556Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆496Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆504Updated last year
- A Highly capable Pe Packer☆710Updated 2 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆418Updated last year
- Command and Control Framework written in C#☆413Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆982Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆955Updated last year
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆473Updated 3 years ago
- ☆326Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆644Updated last month
- Protected Process Dumper Tool☆555Updated last year
- A C# Command & Control framework☆1,000Updated last year
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆950Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆272Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆439Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆922Updated 3 weeks ago
- Lifetime AMSI bypass☆629Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,049Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆498Updated last year
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆814Updated 4 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆523Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆865Updated 5 months ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆794Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆618Updated last year
- Now You See Me, Now You Don't☆949Updated 5 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆814Updated 11 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆755Updated 2 years ago