3xpl01tc0d3r / ObfuscatorLinks
The program is designed to obfuscate the shellcode.
☆202Updated 4 years ago
Alternatives and similar repositories for Obfuscator
Users that are interested in Obfuscator are comparing it to the libraries listed below
Sorting:
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Updated 5 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆248Updated 5 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆205Updated last year
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆163Updated 5 years ago
- AmsiScanBufferBypass using D/Invoke☆136Updated 4 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆118Updated 2 years ago
- Create a minidump of the LSASS process from memory☆260Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Updated last year
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆239Updated 2 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆108Updated 2 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- dem sharp donuts☆201Updated 3 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 3 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 5 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 4 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆262Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆110Updated 3 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆219Updated 6 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 8 months ago
- Shellcoding utilities☆223Updated 4 years ago
- Simple PoC demonstrating syscall execution in C#☆155Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Updated 4 years ago