arimaqz / strfile-encryptorLinks
string/file/shellcode encryptor using AES/XOR
☆11Updated 2 years ago
Alternatives and similar repositories for strfile-encryptor
Users that are interested in strfile-encryptor are comparing it to the libraries listed below
Sorting:
- in-process powershell runner for BRC4☆48Updated 2 years ago
- ☆60Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆49Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- custom impacket mssqlclient☆26Updated 2 years ago
- ☆24Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 7 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- A pure C version of SymProcAddress☆30Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- All my POC related to malware development☆14Updated last year
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆28Updated 6 months ago
- miscellaneous codes☆36Updated 2 years ago
- ☆59Updated last year
- ☆47Updated 2 years ago
- Rewrite to fit my needs☆32Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Updated 2 years ago
- Things i do because i saw it on twitter on a weekend☆57Updated 4 months ago
- Sniffing files generator☆59Updated 9 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆17Updated 5 months ago
- ☆38Updated 8 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago