EvilBytecode / EByte-VBS-Obfuscator-GoLinks
VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less recognizable form by employing random variable names and encoding character values using mathematical operations. This helps protect scripts from casual inspection and modification.
☆36Updated 6 months ago
Alternatives and similar repositories for EByte-VBS-Obfuscator-Go
Users that are interested in EByte-VBS-Obfuscator-Go are comparing it to the libraries listed below
Sorting:
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆43Updated 3 weeks ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- 一个普通的BOF用来BypassUAC☆22Updated last year
- Kill Everything AV/EDR☆27Updated 11 months ago
- Help red teams find opsec processes during engagements☆43Updated 10 months ago
- can convert EXE/DLL into position-independent shellcode☆35Updated last month
- ASPX ShellCode Loader☆53Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- kill AV/EDR☆22Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆61Updated 2 years ago
- Self Cleanup in post-ex job☆58Updated last year
- AddDefenderExclusions Beacon Object File☆40Updated 2 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- 在cobaltstrike中使用的bof工具集,收集整理验证好用的bof。☆15Updated 4 years ago
- More EFS coerced authentication method with PetitPotam.py☆26Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆57Updated 2 years ago
- ☆27Updated 2 years ago
- ☆31Updated 2 years ago
- ☆24Updated 6 months ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆54Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆43Updated 5 months ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- Evasive loader to bypass static detection☆59Updated last year
- A BOF to create a scheduled task using a COM object.☆13Updated 10 months ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆34Updated 3 months ago
- ☆19Updated 3 years ago
- ☆43Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆77Updated 2 years ago