Obfuscate and run .exe files in a powershell script
☆18Apr 2, 2023Updated 2 years ago
Alternatives and similar repositories for frankenstein-obfuscator
Users that are interested in frankenstein-obfuscator are comparing it to the libraries listed below
Sorting:
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆29May 19, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆28Jan 17, 2026Updated last month
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- ☆12Feb 7, 2023Updated 3 years ago
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- ☆11Mar 11, 2021Updated 4 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- 先知社区爬虫,爬取文章保存为本地md文件☆13Sep 24, 2022Updated 3 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- Mishky's AD Range & The Escalation Path from Hell☆16Jan 16, 2025Updated last year
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- SQLmap Command Builder☆15May 30, 2019Updated 6 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Aug 31, 2022Updated 3 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 3 months ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- A lightweight text editor written in LuaJIT (Custom version of rxi/lite)☆12Aug 31, 2025Updated 6 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- ☆15Dec 12, 2023Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Oct 31, 2018Updated 7 years ago
- Python Scrapy spider that searches Google for a particular keyword and extracts all data from the SERP results. The spider will iterate t…☆18Feb 8, 2023Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago