A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it
☆16Jun 13, 2025Updated 9 months ago
Alternatives and similar repositories for Invoke-Mathfuscation
Users that are interested in Invoke-Mathfuscation are comparing it to the libraries listed below
Sorting:
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆15Jan 4, 2024Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Apr 6, 2025Updated 11 months ago
- A Python-based VBScript Code Obfuscator☆46Dec 2, 2025Updated 3 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites.…☆15Jan 16, 2024Updated 2 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- ☆10Nov 21, 2024Updated last year
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- ARC scoring code for various common self report measures☆15Nov 10, 2022Updated 3 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Mar 15, 2026Updated last week
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆18Aug 8, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Life32 - Conway's game of life player☆19Jul 9, 2016Updated 9 years ago
- Chrome extension that replaces occurrences of 'machine learning' with 'money la*ndering'☆14Feb 4, 2025Updated last year
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆21Apr 2, 2025Updated 11 months ago
- A Chrome Extension and Bookmarklet that adds an auto-scroll feature on TikTok so you can watch TikToks without the need to touch your mou…☆17Apr 10, 2025Updated 11 months ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 7 months ago
- An advanced yet simple attack/defence CTF infrastructure in Go☆15Feb 16, 2025Updated last year
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆16Jan 15, 2025Updated last year
- An autonomous drone and sensor based surveillance system that use a Tello Drone, an Arduino, a Raspberry Pi and an Android smartphone.☆33Dec 30, 2023Updated 2 years ago
- Deploying Apache Guacamole on Google Cloud - provides terraform for deploying GCP resources as well as a Guacamole auth plugin to enable …☆20Mar 2, 2026Updated 2 weeks ago
- PoC Bypass Chrome Cookies App-Bound Encryption v20☆12Apr 9, 2025Updated 11 months ago
- ☆81Feb 12, 2026Updated last month
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆42Jun 19, 2022Updated 3 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Simple Unity ECS framework that supports all the basics of an RPG☆13Jun 23, 2020Updated 5 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago