Dump-GUY / Get-UnJlaiveLinks
Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.
☆22Updated 3 years ago
Alternatives and similar repositories for Get-UnJlaive
Users that are interested in Get-UnJlaive are comparing it to the libraries listed below
Sorting:
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Obfuscator for batch script☆62Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- ☆32Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- ☆16Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- Dump certificates from PE files in different formats☆38Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 6 months ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆109Updated 2 years ago
- UAC Bypass for windows☆38Updated 5 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- ☆75Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- A Bumblebee-inspired Crypter☆79Updated 3 years ago
- ☆37Updated 9 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Updated 3 years ago
- using the gpu to hide your payload☆63Updated 3 years ago