Dump-GUY / Get-UnJlaiveLinks
Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.
☆22Updated 3 years ago
Alternatives and similar repositories for Get-UnJlaive
Users that are interested in Get-UnJlaive are comparing it to the libraries listed below
Sorting:
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Easy XOR string encryption for NET based binaries☆139Updated last year
- Obfuscator for batch script☆63Updated 10 months ago
- ☆16Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆87Updated 4 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- using the gpu to hide your payload☆59Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆107Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆105Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- ☆37Updated 3 months ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- C# Utilities for Windows Notification Facility☆153Updated 2 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- ☆55Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Small visualizator for PE files☆69Updated last year