kkar / PyFuscatorLinks
Python source random obfuscation
☆11Updated 2 years ago
Alternatives and similar repositories for PyFuscator
Users that are interested in PyFuscator are comparing it to the libraries listed below
Sorting:
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- InfoPath Phishing Repo Resource☆70Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- Disabling Windows Defender & downloading payload☆21Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- medium-rare☆28Updated 5 years ago
- Sorano☆17Updated 5 years ago
- PIC code gen and loading☆13Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆37Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- VBA Reversed TCP Meterpreter Stager☆63Updated 7 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago