A string obfuscator for .NET apps, built to evade static string analysis.
☆109Jan 3, 2023Updated 3 years ago
Alternatives and similar repositories for MurkyStrings
Users that are interested in MurkyStrings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy XOR string encryption for NET based binaries☆139Nov 4, 2023Updated 2 years ago
- Packer compressing .net assemblies, (ab)using the PE format for data storage☆177Jan 14, 2023Updated 3 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 5 months ago
- Deobfuscator for remove proxy calls methods☆27Jan 30, 2023Updated 3 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🔓 Decrypt strings from a .NET module dump protected by Themida, the advanced windows software protection system☆20Mar 20, 2021Updated 5 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆48Jan 8, 2023Updated 3 years ago
- .NET attributes cleaner/Junk remover (nops). Credits to Prab + Illuzion.☆21May 12, 2022Updated 3 years ago
- ☆246Dec 16, 2022Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆140Dec 20, 2022Updated 3 years ago
- A simple tool for converting strings to unmanaged methods using AsmResolver.☆59Sep 17, 2023Updated 2 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Various ways to execute shellcode☆510Mar 13, 2024Updated 2 years ago
- HookDetector.NET is a .NET Library to detect hooks in API functions☆27Nov 21, 2020Updated 5 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆194Nov 15, 2022Updated 3 years ago
- Utility that tries to generate every single CIL opcode possible in a valid context.☆28Sep 7, 2022Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago
- ☆276Jan 14, 2023Updated 3 years ago
- ☆164Dec 30, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Unpacker for ILProtector☆30Feb 24, 2023Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆111Apr 14, 2023Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Implant drop-in for EDR testing☆148Nov 15, 2023Updated 2 years ago
- most string deobfuscators use Invoke to pick up the strings, however some obfuscators are using "GetCallingAssembly" to check if the meth…☆12Feb 24, 2019Updated 7 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- Here's an old project that I still haven't released, but that I'm going to do today☆32Jun 5, 2021Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆157Jan 21, 2023Updated 3 years ago
- Pack your .NET assembly into a Native (C++)☆12Dec 19, 2022Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Jun 18, 2023Updated 2 years ago