deoktr / pofLinks
Offensive security toolkit to obfuscate Python code, stage payloads, and evade defenses
☆23Updated last week
Alternatives and similar repositories for pof
Users that are interested in pof are comparing it to the libraries listed below
Sorting:
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 4 years ago
- A Bumblebee-inspired Crypter☆80Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- ☆16Updated 4 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Updated last year
- Bypass Malware Time Delays☆108Updated 3 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Updated 11 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- A C# implementation that disables Windows Firewall bypassing UAC☆17Updated last year
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A simple PE loader.☆27Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Updated last year
- ☆42Updated 4 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year