Maldev-Academy / AlphabetfuscationLinks
Convert your shellcode into an ASCII string
☆124Updated 6 months ago
Alternatives and similar repositories for Alphabetfuscation
Users that are interested in Alphabetfuscation are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 6 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆89Updated 10 months ago
- Permanently disable EDRs as local admin☆124Updated last month
- Stage 0☆169Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆147Updated last month
- Enumerate active EDR's on the system☆148Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆149Updated last week
- Adversary Emulation Framework☆129Updated 6 months ago
- ☆157Updated 8 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆189Updated 2 weeks ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated this week
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Evasive Payload Delivery Server & C2 Redirector☆112Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆139Updated last month
- A Mythic agent for Windows written in C☆151Updated last week
- Shellcode injection using the Windows Debugging API☆160Updated 2 weeks ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- A hoontr must hoont☆101Updated last month
- ☆36Updated 6 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- ☆57Updated 6 months ago