3xpl01tc0d3r / ObfuscatorLinks
The program is designed to obfuscate the shellcode.
☆202Updated 4 years ago
Alternatives and similar repositories for Obfuscator
Users that are interested in Obfuscator are comparing it to the libraries listed below
Sorting:
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆348Updated 5 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 6 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆207Updated last year
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Create a minidump of the LSASS process from memory☆261Updated 3 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Updated 5 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Updated 4 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Updated last year
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Updated 5 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆113Updated 2 years ago
- Shellcoding utilities☆224Updated 5 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆133Updated 2 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆239Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆264Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆304Updated 5 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆162Updated 5 years ago
- Process Ghosting Tool☆176Updated 4 years ago
- AmsiScanBufferBypass using D/Invoke☆136Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆110Updated 4 years ago
- Evading WinDefender ATP credential-theft☆256Updated 6 years ago
- Shellcode injector using direct syscalls☆123Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275Updated 2 years ago
- ☆155Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆383Updated 2 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆118Updated 2 years ago
- Simple PoC demonstrating syscall execution in C#☆155Updated 5 years ago