Dump-GUY / Get-UnJlaive
Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.
☆22Updated 2 years ago
Alternatives and similar repositories for Get-UnJlaive:
Users that are interested in Get-UnJlaive are comparing it to the libraries listed below
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆40Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- using the gpu to hide your payload☆54Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Read my blog for more info -☆32Updated 3 years ago
- ☆15Updated 3 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- UAC Bypass for windows☆37Updated 5 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆42Updated 3 years ago
- Obfuscator for batch script☆57Updated 5 months ago
- A small shellcode loader library written in C#☆45Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆53Updated 2 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆86Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆41Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Bypass Malware Time Delays☆99Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- Overwrite MBR and add own custom message☆15Updated 4 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 9 months ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated 2 weeks ago