PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional features for execution control.
☆46Aug 16, 2025Updated 6 months ago
Alternatives and similar repositories for PandaCrypter
Users that are interested in PandaCrypter are comparing it to the libraries listed below
Sorting:
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆38Feb 11, 2026Updated 2 weeks ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆18Sep 30, 2022Updated 3 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 4 months ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆55Nov 17, 2025Updated 3 months ago
- ☆27Oct 27, 2025Updated 4 months ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆24Sep 22, 2025Updated 5 months ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 6 months ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Oct 18, 2025Updated 4 months ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.☆17Jan 7, 2023Updated 3 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Sep 26, 2023Updated 2 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- A lightweight (<3MB) Discord RAT & Stealer written in Go.☆14Dec 17, 2025Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆61Apr 27, 2025Updated 10 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆54Feb 15, 2026Updated last week
- Advanced analysis software for APK payloads created by RATs.☆35Jan 12, 2026Updated last month
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆77Apr 27, 2025Updated 10 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆285Oct 1, 2025Updated 4 months ago
- ☆35Feb 1, 2026Updated 3 weeks ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆84Sep 27, 2025Updated 5 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆125Nov 17, 2025Updated 3 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Mockingjay process self injection POC☆44Aug 8, 2023Updated 2 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆139Apr 27, 2025Updated 10 months ago
- Obex – Blocking unwanted DLLs in user mode☆281Sep 18, 2025Updated 5 months ago
- Good CLR Host with Native patchless AMSI Bypass☆103Apr 18, 2025Updated 10 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago