bypick / Satanic-CrypterLinks
Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.
☆10Updated last year
Alternatives and similar repositories for Satanic-Crypter
Users that are interested in Satanic-Crypter are comparing it to the libraries listed below
Sorting:
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆14Updated 7 months ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆12Updated last year
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆43Updated 5 months ago
- ☆44Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Updated 8 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 7 months ago
- execute PE in memory Filelessly☆50Updated 11 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆46Updated 8 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆14Updated last year
- Public repo of some woking evilginx phishlets☆40Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆98Updated 11 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 2 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Updated 2 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆24Updated 6 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆28Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- Excel Add In Payload Generator☆13Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated last month
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- The best powershell obfuscator ever made☆119Updated 5 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Nim process hollowing loader☆62Updated 5 months ago
- ☆14Updated 10 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- VBS Crypter, Exe To VBS☆15Updated 3 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year