The first open source runtime windows batch and command line deobfuscator
☆43Aug 20, 2025Updated 7 months ago
Alternatives and similar repositories for Exorcism
Users that are interested in Exorcism are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- The best powershell obfuscator ever made☆126Aug 1, 2025Updated 7 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Apr 27, 2025Updated 10 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- ☆30Nov 25, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.☆25Mar 2, 2024Updated 2 years ago
- GolangStyle, best looking go library.☆13Apr 21, 2025Updated 11 months ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆81Nov 13, 2024Updated last year
- [WIP] A Modern Rust Remote Administration Tool for Windows.☆61Nov 7, 2025Updated 4 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- The popular open-source .NET protector ConfuserEX. The history is: Confuser -> ConfuserEx -> neo-ConfuserEx -> ConfuserEx2☆27Apr 9, 2023Updated 2 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- ☆45Oct 10, 2025Updated 5 months ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Most advanced and poorly coded windows batch obfuscator ever made (aka the best)☆348Dec 1, 2025Updated 3 months ago
- ☆14Dec 26, 2022Updated 3 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- Latest UserAgents Dumped Various Devices / Platforms☆19Updated this week
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Mar 16, 2026Updated last week
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- Patched Bash 3.2.24 to log all actions to syslog☆13Dec 16, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆123Jul 19, 2025Updated 8 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- A modern, open-source desktop application for testing and validating proxy lists with real-time results.☆29Aug 5, 2025Updated 7 months ago
- Headless IDA Pro binary analysis via Model Context Protocol☆78Feb 16, 2026Updated last month
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆118Feb 12, 2026Updated last month
- Python obfuscator with some cool features☆16Mar 19, 2025Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆160Jan 7, 2025Updated last year
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 11 months ago
- Dump quarantined files from Windows Defender☆75Apr 6, 2022Updated 3 years ago