EvilBytecode / PS2BATLinks
A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.
☆11Updated 2 months ago
Alternatives and similar repositories for PS2BAT
Users that are interested in PS2BAT are comparing it to the libraries listed below
Sorting:
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated last month
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆9Updated 2 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- UAC via computerdefaults.exe☆12Updated 2 months ago
- Examples how to use a Assm (Assembly) in a go.☆18Updated 2 months ago
- reverse engineering random malwares☆23Updated 4 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- ☆18Updated last month
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆15Updated last year
- A malicous Golang Package☆14Updated 2 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆10Updated 2 months ago
- GetSyscallStubCGo.☆10Updated 2 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆16Updated 7 months ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆13Updated 11 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated 2 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 10 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- ☆31Updated 2 months ago
- Deobfuscation of XorStringsNet☆14Updated 7 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 8 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago