A simple commandline application to automatically decrypt strings from Obfuscator protected binaries
☆47Jun 15, 2024Updated last year
Alternatives and similar repositories for Deobfuscar
Users that are interested in Deobfuscar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- ☆20Nov 6, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39Updated this week
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Jan 25, 2024Updated 2 years ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆102Aug 5, 2024Updated last year
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Updated this week
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A database based strong Windows Disk Cleaner With Utilities☆52Apr 1, 2026Updated last week
- ☆11Nov 17, 2024Updated last year
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoCs for Kernelmode rootkit techniques research.☆437Mar 25, 2026Updated 2 weeks ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 4 years ago
- A modern and open source .NET obfuscation engine for everyone.☆22Nov 30, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- A Command-Line Tool for Removing DotNetRuntimeDebugHeader from NativeAOT Published .NET PE Files.☆18Nov 16, 2023Updated 2 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- The samples referenced in my book, Evasive Malware (No starch Press)☆59Feb 20, 2026Updated last month
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- 微软签名缺陷利用,老技术☆18Aug 10, 2021Updated 4 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Введение в разработку вредоносных программ☆12Oct 15, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 4 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Apple PCC research☆17Mar 14, 2025Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆41May 22, 2024Updated last year