Utilities for obfuscating shellcode
☆103Mar 24, 2026Updated last month
Alternatives and similar repositories for Chromatophore
Users that are interested in Chromatophore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of position independent coding resources☆113Nov 15, 2025Updated 5 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆134Oct 4, 2024Updated last year
- ☆111Feb 17, 2025Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆119May 2, 2024Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆379Apr 19, 2023Updated 3 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆140Aug 19, 2025Updated 8 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 9 months ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆212Mar 10, 2024Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆516May 19, 2025Updated 11 months ago
- Lifetime AMSI bypass☆676Sep 26, 2023Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆38Jan 20, 2025Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 6 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆476Jul 6, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- COFF file (BOF) for managing Kerberos tickets.☆322Jul 2, 2023Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆301Mar 24, 2026Updated last month
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆116Feb 13, 2022Updated 4 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆339Aug 7, 2024Updated last year