Hide an IP address in scripts using hex/decimal/octal conversions
☆72Apr 6, 2025Updated 10 months ago
Alternatives and similar repositories for IP-Obfuscator
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
Sorting:
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆15Jan 4, 2024Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- A Python-based VBScript Code Obfuscator☆44Dec 2, 2025Updated 2 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆40Apr 7, 2025Updated 10 months ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Updated this week
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆180Feb 27, 2024Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- SIEM Visibility assessment☆14May 22, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Built to learn ethical hacking on your own☆142May 3, 2024Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆246Aug 2, 2023Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- ☆11Sep 3, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Jul 25, 2023Updated 2 years ago
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 3 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year