Maldev-Academy / AlphabetfuscationLinks
Convert your shellcode into an ASCII string
☆124Updated 4 months ago
Alternatives and similar repositories for Alphabetfuscation
Users that are interested in Alphabetfuscation are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆146Updated 3 months ago
- Enumerate active EDR's on the system☆139Updated last month
- Permanently disable EDRs as local admin☆118Updated 3 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆86Updated 7 months ago
- A small How-To on creating your own weaponized WSL file☆117Updated 3 months ago
- Adversary Emulation Framework☆125Updated 3 months ago
- ☆148Updated 5 months ago
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- Stage 0☆164Updated 10 months ago
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆130Updated 3 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆75Updated last year
- A hoontr must hoont☆99Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- Automated .NET AppDomain hijack payload generation☆127Updated 8 months ago
- ☆59Updated 11 months ago
- Evasive Payload Delivery Server & C2 Redirector☆106Updated 2 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 4 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- A Mythic agent for Windows written in C☆137Updated 2 weeks ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆127Updated 2 months ago
- ☆192Updated 7 months ago
- ☆83Updated 5 months ago
- ☆57Updated 8 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- ☆33Updated 3 months ago
- CVE-2025-33053 Proof Of Concept (PoC)☆59Updated 4 months ago