TheCyb3rAlpha / BobTheSmugglerView external linksLinks
"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots).
☆579Oct 23, 2025Updated 3 months ago
Alternatives and similar repositories for BobTheSmuggler
Users that are interested in BobTheSmuggler are comparing it to the libraries listed below
Sorting:
- A beacon object file implementation of PoolParty Process Injection Technique.☆432Dec 21, 2023Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆855Feb 3, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆408Jan 11, 2026Updated last month
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆502Dec 19, 2023Updated 2 years ago
- .net config loader☆348Nov 9, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆517Dec 17, 2025Updated last month
- Modified versions of the Cobalt Strike Process Injection Kit☆105Jan 24, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆621Jun 25, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,044Oct 14, 2025Updated 3 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Jun 10, 2024Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Mar 4, 2024Updated last year
- Abuse leaked token handles.☆134Dec 14, 2023Updated 2 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆399Sep 26, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,243Dec 11, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Jan 5, 2024Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,083Jun 10, 2024Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- An App Domain Manager Injection DLL PoC on steroids☆210Dec 14, 2023Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- An offensive data enrichment pipeline☆914Updated this week
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆534Jun 3, 2025Updated 8 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,813Nov 3, 2024Updated last year
- EDR Lab for Experimentation Purposes☆1,409Jan 20, 2026Updated 3 weeks ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆609Jan 2, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆540Nov 23, 2025Updated 2 months ago
- ☆567Mar 28, 2024Updated last year