deoktr / pofLinks
Offensive security toolkit to obfuscate Python code, stage payloads, and evade defenses
☆23Updated last week
Alternatives and similar repositories for pof
Users that are interested in pof are comparing it to the libraries listed below
Sorting:
- A Bumblebee-inspired Crypter☆80Updated 3 years ago
- ☆16Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- ☆42Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- API Hammering with C++20☆50Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- ☆61Updated 2 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Updated 2 years ago
- reverse engineering random malwares☆22Updated last year
- A simple PE loader.☆27Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆43Updated 4 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago