deoktr / pofLinks
Python Obfuscation Framework
☆18Updated 3 weeks ago
Alternatives and similar repositories for pof
Users that are interested in pof are comparing it to the libraries listed below
Sorting:
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated last month
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 7 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- ☆18Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 10 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- ☆54Updated 2 years ago
- ☆17Updated 10 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆17Updated last month
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- ☆59Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆11Updated 4 months ago
- ECC Public Key Cryptography☆37Updated last year
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆14Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 11 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 11 months ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago