☆130Oct 19, 2024Updated last year
Alternatives and similar repositories for Phantom
Users that are interested in Phantom are comparing it to the libraries listed below
Sorting:
- ☆12Oct 19, 2024Updated last year
- ☆11May 5, 2024Updated last year
- ☆29Oct 19, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- ☆21Jan 8, 2026Updated last month
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 9 months ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 7 months ago
- ☆27Oct 27, 2025Updated 4 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Oct 18, 2025Updated 4 months ago
- ☆44Apr 27, 2024Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆78Apr 27, 2025Updated 10 months ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆186Jun 14, 2025Updated 8 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆34Jun 23, 2024Updated last year
- A unique introduction to native runtime obfuscation.☆75Mar 2, 2025Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆157Jan 7, 2025Updated last year
- ☆53Sep 23, 2025Updated 5 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- ☆13Sep 8, 2024Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆61Apr 27, 2025Updated 10 months ago
- ☆126Sep 1, 2024Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year