Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates directly on the Go Abstract Syntax Tree (AST) and generates both obfuscated source files and runtime decryption logic.
☆124Jul 19, 2025Updated 8 months ago
Alternatives and similar repositories for Ebyte-Go-Morpher
Users that are interested in Ebyte-Go-Morpher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- ☆21Jan 8, 2026Updated 3 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 8 months ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Seamless remote browser session control☆233Jan 28, 2026Updated 2 months ago
- Make your programs stealthier🐝☆203Jun 12, 2025Updated 9 months ago
- ☆48Dec 5, 2025Updated 4 months ago
- AI-based implant feature☆25Apr 28, 2025Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 11 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Ghosting-AMSI☆230Apr 24, 2025Updated 11 months ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 9 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- ☆34Mar 19, 2025Updated last year
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 2 weeks ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆22Apr 21, 2025Updated 11 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ON…☆849Dec 10, 2025Updated 4 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆77Jun 16, 2025Updated 9 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆202Dec 30, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- Windows anti-debugging sandbox☆41Dec 24, 2025Updated 3 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 6 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 10 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 10 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 8 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆391Mar 27, 2026Updated 2 weeks ago
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 7 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago