CrackerCat / CallObfuscatorLinks
Obfuscate specific windows apis with different apis
☆12Updated last year
Alternatives and similar repositories for CallObfuscator
Users that are interested in CallObfuscator are comparing it to the libraries listed below
Sorting:
- 感染PE文件的病毒学习过程☆32Updated 4 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- simple shellcode loader for linux & win, x86 & x64☆33Updated 8 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆34Updated 2 years ago
- ☆57Updated 6 years ago
- Kernel file/process/object tool☆67Updated 4 years ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆34Updated 3 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- AppContainerBypass☆21Updated 4 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 7 years ago
- 2018年初整理的一些内网渗透TIPS,后面更新的慢,所以公开出来希望跟小伙伴们一起更新维护~☆9Updated 6 years ago
- ☆35Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- dll proxying☆60Updated 4 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Windows file stream util tool☆21Updated 12 years ago
- Process Hollowing Packer☆27Updated 7 years ago
- May the POC be with you☆60Updated 2 weeks ago
- cve-2019-0808-poc☆48Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Updated 2 years ago
- Add export function and convert exe to dll☆26Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- ☆12Updated 4 years ago
- ☆40Updated 3 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Updated last year
- inject or convert shellcode to PE☆40Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆28Updated 6 years ago