chainski / PandaCrypterLinks
PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional features for execution control.
☆41Updated 4 months ago
Alternatives and similar repositories for PandaCrypter
Users that are interested in PandaCrypter are comparing it to the libraries listed below
Sorting:
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆14Updated 6 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 8 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆24Updated 5 months ago
- The best powershell obfuscator ever made☆120Updated 5 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 2 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆91Updated 8 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆58Updated 8 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆44Updated 8 months ago
- Troll TaskManager, and play with it .☆29Updated 5 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆97Updated 10 months ago
- ☆50Updated last year
- ☆28Updated 2 months ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆47Updated last month
- Public repo of some woking evilginx phishlets☆39Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 9 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆274Updated 3 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆133Updated 8 months ago
- A C2 framework built for my bachelors thesis☆55Updated last month
- Excel Add In Payload Generator☆13Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- ☆43Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 7 months ago
- execute PE in memory Filelessly☆50Updated 11 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆44Updated 7 months ago