dotPY-hax / frankenstein-obfuscatorView external linksLinks
Obfuscate and run .exe files in a powershell script
☆17Apr 2, 2023Updated 2 years ago
Alternatives and similar repositories for frankenstein-obfuscator
Users that are interested in frankenstein-obfuscator are comparing it to the libraries listed below
Sorting:
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆29May 19, 2023Updated 2 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- Common User Password Profiler☆13Aug 20, 2025Updated 5 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- ☆11Mar 11, 2021Updated 4 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- ☆13Jul 26, 2025Updated 6 months ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- 先知社区爬虫,爬取文章保存为本地md文件☆13Sep 24, 2022Updated 3 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- Mishky's AD Range & The Escalation Path from Hell☆16Jan 16, 2025Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 10 months ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- SQLmap Command Builder☆15May 30, 2019Updated 6 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 2 months ago
- A lightweight text editor written in LuaJIT (Custom version of rxi/lite)☆12Aug 31, 2025Updated 5 months ago
- Windows x64 Exploitation Training☆15May 30, 2025Updated 8 months ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Aug 31, 2022Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- MCP server for AdaptixC2☆24Jul 20, 2025Updated 6 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Ransomware Chat Simulation☆20Mar 18, 2025Updated 10 months ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- vim binary for Linux x86_64 (static) and Win32 x64 / x86 (no-OLE)☆14Feb 1, 2026Updated 2 weeks ago
- ☆20Nov 1, 2022Updated 3 years ago