Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
☆21Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for Dynamizer
Users that are interested in Dynamizer are comparing it to the libraries listed below
Sorting:
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆72May 14, 2022Updated 3 years ago
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Sep 26, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- ☆19Aug 10, 2022Updated 3 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆92Mar 23, 2023Updated 2 years ago
- ☆23May 28, 2021Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆21Dec 12, 2021Updated 4 years ago
- ☆29Dec 20, 2025Updated 2 months ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- CVE-2019-14540 Exploit☆21Aug 21, 2019Updated 6 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- simple c++ visual studio project that doesn't use the C/C++ runtime☆27May 31, 2018Updated 7 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago