Maldev-Academy / AlphabetfuscationLinks
Convert your shellcode into an ASCII string
☆127Updated 7 months ago
Alternatives and similar repositories for Alphabetfuscation
Users that are interested in Alphabetfuscation are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Updated 11 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆148Updated 2 months ago
- Permanently disable EDRs as local admin☆125Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- Stage 0☆169Updated last year
- A small How-To on creating your own weaponized WSL file☆119Updated 6 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆183Updated 3 weeks ago
- Adversary Emulation Framework☆129Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Chisel new generation, written in rust. SSH under WSS with some customization.☆124Updated 2 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- A BOF to enumerate system process, their protection levels, and more.☆124Updated last year
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆222Updated 3 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Updated 3 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆205Updated last month
- Shellcode injection using the Windows Debugging API☆165Updated last month
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆233Updated this week
- ☆159Updated 9 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- ☆57Updated 11 months ago
- Just another EDR killer☆88Updated 3 weeks ago
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Updated 7 months ago
- A Mythic agent for Windows written in C☆156Updated this week