gum3t / chameleonLinks
Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-based detections in red team environments.
☆37Updated last month
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
 - Execute shellcode via ASPNET compiler☆58Updated last month
 - POC of GITHUB simple C2 in rust☆52Updated 3 months ago
 - Remote DLL Injection with Timer-based Shellcode Execution☆149Updated 3 months ago
 - Stage 0☆164Updated 10 months ago
 - ☆108Updated last year
 - Permanently disable EDRs as local admin☆119Updated 3 weeks ago
 - Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆98Updated last week
 - The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆291Updated last week
 - Persist like a Dodder☆66Updated 5 months ago
 - Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆156Updated 3 months ago
 - ☆157Updated 4 months ago
 - Obex – Blocking unwanted DLLs in user mode☆256Updated last month
 - Windows Administrator level Implant.☆49Updated last year
 - ☆33Updated 4 months ago
 - Enumerate active EDR's on the system☆139Updated last month
 - Utilizng an MCP Server to communicate with your C2☆81Updated 5 months ago
 - A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆149Updated 3 months ago
 - A hoontr must hoont☆101Updated 2 months ago
 - ☆161Updated 7 months ago
 - Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆180Updated last month
 - ☆144Updated last month
 - BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 2 weeks ago
 - A small How-To on creating your own weaponized WSL file☆117Updated 3 months ago
 - Bypass user-land hooks by syscall tampering via the Trap Flag☆129Updated 2 months ago
 - ☆83Updated 3 months ago
 - .NET tool used to enrich RPC telemetry☆99Updated 4 months ago
 - The different ways to dump lsass☆193Updated 2 months ago
 - ☆41Updated 8 months ago
 - Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year