A simple commandline application to automatically decrypt strings from Obfuscator protected binaries
☆47Jun 15, 2024Updated last year
Alternatives and similar repositories for Deobfuscar
Users that are interested in Deobfuscar are comparing it to the libraries listed below
Sorting:
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆76May 19, 2024Updated last year
- ☆19Jan 25, 2024Updated 2 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- A modern and open source .NET obfuscation engine for everyone.☆23Nov 30, 2024Updated last year
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆432Nov 4, 2025Updated 4 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated 3 weeks ago
- ☆12Nov 17, 2024Updated last year
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- ☆27Sep 13, 2023Updated 2 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 2 months ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A database-based strong Windows Disk Cleaner With Utilities☆19Nov 25, 2025Updated 3 months ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- ☆10Aug 10, 2019Updated 6 years ago
- A Command-Line Tool for Removing DotNetRuntimeDebugHeader from NativeAOT Published .NET PE Files.☆18Nov 16, 2023Updated 2 years ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆28Oct 24, 2021Updated 4 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆37Updated this week
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 6 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Basic Psexec clone, but in golang.☆16Jul 2, 2022Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Trimming down unnecessary bits out of Microsoft.Data.SqlClient☆17Jun 18, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- A simple C2 using Google Translate Webpage for data evasion☆12Jan 30, 2023Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago