Generate malware with AI
☆206Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for SynthAPT
Users that are interested in SynthAPT are comparing it to the libraries listed below
Sorting:
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆69Jan 19, 2026Updated 2 months ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- The Azure Execution Tool☆139Feb 6, 2026Updated last month
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- ☆37Feb 12, 2026Updated last month
- Rust Linux Kernel Module designed for LKM rootkit detection☆60Mar 12, 2025Updated last year
- ☆15May 30, 2025Updated 9 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Obsidian Vault for my Cybersecurity learning☆10Oct 20, 2024Updated last year
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- ☆17Feb 14, 2025Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆121Dec 23, 2025Updated 2 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆139Apr 6, 2025Updated 11 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆26Apr 21, 2025Updated 10 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- ☆12Feb 4, 2025Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- ☆33Mar 19, 2025Updated last year
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆149Mar 4, 2026Updated 2 weeks ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 10 months ago
- ProxyWatch☆46Feb 28, 2026Updated 3 weeks ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆68Mar 10, 2026Updated last week
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Helpful WinDBG command for kernel debugging☆28Nov 29, 2020Updated 5 years ago
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 3 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Helper functions for calculating the authenticode digest for a portable executable file☆21Apr 30, 2020Updated 5 years ago