A simple commandline application to automatically decrypt strings from Obfuscator protected binaries
☆47Jun 15, 2024Updated last year
Alternatives and similar repositories for Deobfuscar
Users that are interested in Deobfuscar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- ☆20Nov 6, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆38Updated this week
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- ☆19Jan 25, 2024Updated 2 years ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- A database-based strong Windows Disk Cleaner With Utilities☆21Updated this week
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆435Nov 4, 2025Updated 4 months ago
- ☆12Nov 17, 2024Updated last year
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- A modern and open source .NET obfuscation engine for everyone.☆23Nov 30, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆244Sep 26, 2023Updated 2 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- A Command-Line Tool for Removing DotNetRuntimeDebugHeader from NativeAOT Published .NET PE Files.☆18Nov 16, 2023Updated 2 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- 微软签名缺陷利用,老技术☆18Aug 10, 2021Updated 4 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 3 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Apple PCC research☆17Mar 14, 2025Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago