chainski / AES-EncoderLinks
PowerShell Obfuscator. A PowerShell script anti-virus evasion tool
β79Updated last year
Alternatives and similar repositories for AES-Encoder
Users that are interested in AES-Encoder are comparing it to the libraries listed below
Sorting:
- γπ‘οΈγAVs/EDRs Evasion toolβ104Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ββ114Updated this week
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls executionβ196Updated 6 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ292Updated 7 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.β79Updated 2 months ago
- Execute shellcode files with rundll32β212Updated last year
- CaveCarver - PE backdooring tool which utilizes and automates code cave techniqueβ231Updated 2 years ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code executionβ110Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ58Updated 2 weeks ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β254Updated 2 years ago
- Shellcode obfuscation tool to avoid AV/EDR.β130Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (β¦β182Updated 2 years ago
- Terminate AV/EDR Processes using kernel driverβ350Updated 2 years ago
- AV bypass while you sip your Chai!β224Updated last year
- Modules used by the Havoc Frameworkβ252Updated last year
- WIP shellcode loader in nim with EDR evasion techniquesβ220Updated 3 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β239Updated 2 years ago
- Remote Shellcode Injectorβ220Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educatβ¦β92Updated 2 months ago
- Chrome browser extension-based Command & Controlβ220Updated 5 months ago
- Converts exe to shellcode.β117Updated last year
- The best powershell obfuscator ever madeβ119Updated 4 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.β208Updated 3 years ago
- β333Updated 2 years ago
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shellβ44Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooksβ161Updated last year
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dllβDllMain is Cobalt Strike UDRL-compatibleβ254Updated 5 months ago
- Generate Shellcode Loaders & Injectsβ157Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniquesβ240Updated last year
- A .NET malware loader, using API-Hashing to evade static analysisβ207Updated 2 years ago