Obfuscate a python code 2.x and 3.x
☆643Jul 25, 2020Updated 5 years ago
Alternatives and similar repositories for Intensio-Obfuscator
Users that are interested in Intensio-Obfuscator are comparing it to the libraries listed below
Sorting:
- Obfuscator for Python☆374Feb 23, 2024Updated 2 years ago
- Pyminifier is a Python code minifier, obfuscator, and compressor.☆1,551Jul 13, 2023Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆679Apr 17, 2019Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- A modular C2 framework☆509Updated this week
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆668Aug 17, 2023Updated 2 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- pyobfuscate☆660Sep 17, 2023Updated 2 years ago
- A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.☆4,969Feb 7, 2026Updated 3 weeks ago
- A Golang implant that uses Slack as a command and control server☆461Feb 25, 2023Updated 3 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- Easy files and payloads delivery over DNS☆422Jan 3, 2026Updated 2 months ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Automated DLL Enumerator☆546Dec 21, 2017Updated 8 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,233Dec 27, 2023Updated 2 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆611Jan 30, 2023Updated 3 years ago
- Payload Generation Framework☆1,972Aug 21, 2024Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,429Jul 20, 2024Updated last year
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- ☆36Mar 11, 2019Updated 6 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆493Aug 5, 2019Updated 6 years ago