GH0st3rs / obfusView external linksLinks
String obfuscation in GO
☆14Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for obfus
Users that are interested in obfus are comparing it to the libraries listed below
Sorting:
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- System Security Project☆13Feb 28, 2017Updated 8 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- a fast c-style struct packer & unpacker for golang☆36Jun 16, 2022Updated 3 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 5 years ago
- Process Injection Techniques with Golang☆80May 29, 2020Updated 5 years ago
- Bootstrap Carousel-Blog template is a fully responsive template for Bootstrap lover's, which include navbar, carousel, horizontal blog a…☆12Sep 14, 2019Updated 6 years ago
- This is a article that will teach you the basics of the go programming language in coordination to the article im doing on robust and sec…☆10Aug 15, 2022Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- This repository provides examples that demonstrates how to develop PSoC 4 MCU based analog designs. These examples help you to use periph…☆15Oct 27, 2018Updated 7 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- server2012-Group-policy-RCE☆46Oct 29, 2019Updated 6 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Code and data of the CCS '22 paper titled "Understanding Security Issues in the NFT Ecosystem"☆11Dec 20, 2022Updated 3 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Load a C# assembly from a native executable or a shared library☆14Jan 17, 2026Updated 3 weeks ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆10Jul 1, 2024Updated last year
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Public scripts used to install the Vanta agent☆15Oct 31, 2025Updated 3 months ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 3 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 3 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 6 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆13Apr 11, 2024Updated last year