"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots).
☆596Oct 23, 2025Updated 6 months ago
Alternatives and similar repositories for BobTheSmuggler
Users that are interested in BobTheSmuggler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆109Jan 24, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆875Feb 3, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 4 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆238Feb 12, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- .net config loader☆350Nov 9, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆530Dec 17, 2025Updated 4 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆631Jun 25, 2024Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆324Jul 2, 2023Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,075Oct 14, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆432Apr 18, 2026Updated 3 weeks ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆796Jan 26, 2026Updated 3 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆193Mar 4, 2024Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,146Jun 10, 2024Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,860Nov 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆571Mar 28, 2024Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆189Feb 27, 2024Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆549Feb 13, 2024Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆328Apr 12, 2024Updated 2 years ago
- A C# port from Invoke-GhostTask☆121Jan 5, 2024Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆627Jan 2, 2025Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- An offensive data enrichment pipeline☆958May 2, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Abusing Azure services over C2☆371Jan 20, 2026Updated 3 months ago
- Click Once + App Domain☆67Feb 23, 2026Updated 2 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,258Dec 11, 2023Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆444May 29, 2024Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆563Jun 3, 2025Updated 11 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year