gum3t / chameleonLinks
Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-based detections in red team environments.
☆47Updated 4 months ago
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 6 months ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆160Updated 5 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Shellcode injection using the Windows Debugging API☆164Updated last month
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago
- ☆108Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Updated last month
- Stage 0☆169Updated last year
- ☆164Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆101Updated last week
- The different ways to dump lsass☆236Updated 5 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated 3 weeks ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated last month
- ☆163Updated 7 months ago
- This is practice VM for malware development☆179Updated 2 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- AppLocker-Based EDR Neutralization☆281Updated last month
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated 2 months ago
- ☆152Updated 4 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- A Mythic Agent written in PIC C.☆206Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- Permanently disable EDRs as local admin☆125Updated last month
- Commandline spoofing on Windows☆92Updated 2 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- A Payload Analysis Framework☆114Updated 3 months ago