This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.
☆245Jun 17, 2016Updated 9 years ago
Alternatives and similar repositories for python-x86-obfuscator
Users that are interested in python-x86-obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- metame is a metamorphic code engine for arbitrary executables☆599Oct 6, 2019Updated 6 years ago
- An IDA (Interactive Disassembler) script that can save a chunk of binary from an address.☆11Apr 10, 2019Updated 6 years ago
- Shellcode Compiler☆1,153Sep 1, 2024Updated last year
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 8 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Nov 23, 2017Updated 8 years ago
- Recon 2015 Presentation from Alex Ionescu☆250Jan 27, 2016Updated 10 years ago
- Sickle - Payload Development Kit☆840Jan 14, 2026Updated 2 months ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Windows Console Monitoring☆103Sep 13, 2017Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆101Nov 5, 2018Updated 7 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- A "tiny" meterpreter stager☆128Aug 20, 2019Updated 6 years ago
- Incident Response & Digital Forensics Debugging Extension☆393Dec 11, 2018Updated 7 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆762Jan 28, 2019Updated 7 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago