ShawnDEvans / xorpyLinks
Stupid simple XOR encryption utility
☆34Updated 3 months ago
Alternatives and similar repositories for xorpy
Users that are interested in xorpy are comparing it to the libraries listed below
Sorting:
- ☆45Updated 7 years ago
- ☆29Updated 8 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆78Updated 7 years ago
- Methods of C2☆22Updated 10 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Random Hashcat Scrips☆35Updated last year
- My Python Cookiecutter project template☆32Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 5 years ago
- ☆16Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 8 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- ☆20Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 8 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- ☆42Updated 5 years ago
- ☆17Updated 3 years ago
- ☆60Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Ansible role to configure redirectors for red team C2☆30Updated 7 years ago