DarkCoderSc / OptixGateLinks
Open-source multi-purpose remote access tool for Microsoft Windows
β186Updated last week
Alternatives and similar repositories for OptixGate
Users that are interested in OptixGate are comparing it to the libraries listed below
Sorting:
- β34Updated last year
- Pascal Offsec repo for malware dev and red teaming π©β187Updated 2 years ago
- The best powershell obfuscator ever madeβ119Updated 4 months ago
- Windows Persistence IT-Securityβ108Updated 9 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.β99Updated last year
- β146Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilitiesβ264Updated 2 months ago
- A command and control framework.β54Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β154Updated last year
- β163Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in Cβ133Updated 2 months ago
- Command and Control (C2) frameworkβ132Updated 6 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.β161Updated 4 months ago
- Indirect Syscall with TartarusGate Approach in Goβ132Updated 5 months ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)β145Updated last year
- Create Anti-Copy DRM Malwareβ70Updated last year
- β159Updated 11 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.β109Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders β¦β102Updated 8 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β166Updated last year
- A POC to disable TamperProtection and other Defender / MDE componentsβ234Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destinationβ¦β139Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ203Updated 9 months ago
- β145Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIsβ118Updated last year
- C2 writen in Rust & Go powered by Tor network.β150Updated last month
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to anyβ¦β97Updated 5 months ago
- β151Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctypeβ¦β124Updated 2 years ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooksβ132Updated 11 months ago