GetRektBoy724 / BetterXencrypt
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
☆210Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for BetterXencrypt
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆224Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆377Updated last year
- Assist reverse tcp shells in post-exploration tasks☆214Updated 8 months ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆309Updated last year
- Cobalt Strike kit for Persistence☆466Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆413Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆429Updated last year
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆155Updated 3 years ago
- Remotely enables Restricted Admin Mode☆204Updated 3 years ago
- .NET project for installing Persistence☆455Updated 4 months ago
- ☆349Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆403Updated 2 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆298Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆255Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆448Updated 3 years ago
- Evading Anti-Virus with Unusual Technique☆211Updated last year
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆163Updated 2 years ago
- C# Based Universal API Unhooker☆391Updated 2 years ago
- ☆322Updated last year
- Various Cobalt Strike BOFs☆581Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- Manipulating and Abusing Windows Access Tokens.☆267Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆441Updated 7 months ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆245Updated last year
- Windows Defender ShellCode Execution Bypass☆126Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆462Updated last year
- Bypass AMSI by patching AmsiScanBuffer☆253Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆268Updated 3 weeks ago