☆24Jun 9, 2024Updated last year
Alternatives and similar repositories for Simple-.NET-Obfuscator-PoC
Users that are interested in Simple-.NET-Obfuscator-PoC are comparing it to the libraries listed below
Sorting:
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- Opensource repository for DVID V2☆17Jun 3, 2025Updated 8 months ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆26Feb 20, 2026Updated last week
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆80Nov 18, 2022Updated 3 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- ☆21Jan 8, 2026Updated last month
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Aug 21, 2024Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Jul 5, 2024Updated last year
- ☆17Dec 3, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆15Oct 14, 2024Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆248Sep 8, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Jan 25, 2024Updated 2 years ago
- ☆31Oct 23, 2023Updated 2 years ago
- Kiwi PN532 SPI library for Arduino☆16Feb 2, 2026Updated 3 weeks ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆73Feb 20, 2026Updated last week
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- A Windows potato to privesc☆391Aug 26, 2024Updated last year