Maldev-Academy / AlphabetfuscationLinks
Convert your shellcode into an ASCII string
☆120Updated 3 months ago
Alternatives and similar repositories for Alphabetfuscation
Users that are interested in Alphabetfuscation are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆143Updated 2 months ago
- Enumerate active EDR's on the system☆130Updated 2 weeks ago
- A small How-To on creating your own weaponized WSL file☆115Updated 2 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆80Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 6 months ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆100Updated 3 months ago
- Permanently disable EDRs as local admin☆116Updated 3 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Stage 0☆164Updated 9 months ago
- A hoontr must hoont☆96Updated last month
- Adversary Emulation Framework☆123Updated 3 months ago
- A Mythic agent for Windows written in C☆136Updated last month
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆124Updated 9 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆190Updated 8 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- We found a way to DLL sideload with cleanmgr.exe☆96Updated 7 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Updated 5 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 2 months ago
- Impersonate Tokens using only NTAPI functions☆80Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆130Updated 3 months ago
- ☆81Updated 4 months ago
- ☆147Updated 5 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆123Updated last month
- Utilizng an MCP Server to communicate with your C2☆82Updated 4 months ago
- Evasive Payload Delivery Server & C2 Redirector☆105Updated 2 months ago
- A BOF to enumerate system process, their protection levels, and more.☆120Updated 10 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year