Maldev-Academy / AlphabetfuscationLinks
Convert your shellcode into an ASCII string
☆125Updated 4 months ago
Alternatives and similar repositories for Alphabetfuscation
Users that are interested in Alphabetfuscation are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆151Updated 4 months ago
- A small How-To on creating your own weaponized WSL file☆117Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆86Updated 8 months ago
- Enumerate active EDR's on the system☆146Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 7 months ago
- Permanently disable EDRs as local admin☆121Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- Stage 0☆164Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 11 months ago
- Adversary Emulation Framework☆126Updated 4 months ago
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 5 months ago
- ☆150Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆154Updated 2 weeks ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆132Updated 4 months ago
- A hoontr must hoont☆101Updated 3 months ago
- Evasive Payload Delivery Server & C2 Redirector☆110Updated 2 weeks ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆115Updated last week
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆131Updated 2 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆89Updated 6 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- Utilizng an MCP Server to communicate with your C2☆86Updated 6 months ago
- ☆54Updated 5 months ago
- ☆86Updated 6 months ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆163Updated 2 weeks ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- The DCERPC only printerbug.py version☆152Updated 3 weeks ago
- A Mythic agent for Windows written in C☆140Updated this week