Hide an IP address in scripts using hex/decimal/octal conversions
☆72Apr 6, 2025Updated 11 months ago
Alternatives and similar repositories for IP-Obfuscator
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
Sorting:
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 9 months ago
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆15Jan 4, 2024Updated 2 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- A Python-based VBScript Code Obfuscator☆46Dec 2, 2025Updated 3 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 11 months ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 4 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- ☆20Mar 21, 2024Updated 2 years ago
- Built to learn ethical hacking on your own☆142May 3, 2024Updated last year
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆183Feb 27, 2024Updated 2 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- ☆11Sep 3, 2023Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- A python based tool for finding SQL vulnerable sites.☆14May 22, 2023Updated 2 years ago
- A RedTeam Toolkit☆406Aug 14, 2025Updated 7 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Aug 31, 2022Updated 3 years ago