Obfuscate and run .exe files in a powershell script
☆18Apr 2, 2023Updated 3 years ago
Alternatives and similar repositories for frankenstein-obfuscator
Users that are interested in frankenstein-obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 2 months ago
- ☆29May 19, 2023Updated 2 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Feb 7, 2023Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆14Jul 26, 2025Updated 8 months ago
- ☆33Feb 28, 2023Updated 3 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- PHP CGI Argument Injection vulnerability☆31Jan 24, 2026Updated 2 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆19Mar 4, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆214Jan 2, 2023Updated 3 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated last year
- a c++ implementation of ntlm☆23Jan 24, 2018Updated 8 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- ☆44Updated this week
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago