Dump-GUY / Get-UnJlaiveLinks
Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.
☆22Updated 3 years ago
Alternatives and similar repositories for Get-UnJlaive
Users that are interested in Get-UnJlaive are comparing it to the libraries listed below
Sorting:
- Unpacker and Config Extractor for managed Redline Stealer payloads☆40Updated 2 years ago
- ☆37Updated 8 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- ☆74Updated last year
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago
- Bypass Malware Time Delays☆106Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- ☆33Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆44Updated 5 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 5 months ago
- Obfuscator for batch script☆62Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆80Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆109Updated 2 years ago
- ☆16Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 3 months ago
- simple user-mode Rootkit☆107Updated 3 years ago
- using the gpu to hide your payload☆62Updated 3 years ago