klezVirus / chameleon
PowerShell Script Obfuscator
☆509Updated last year
Alternatives and similar repositories for chameleon:
Users that are interested in chameleon are comparing it to the libraries listed below
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆892Updated 7 months ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆387Updated 4 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,172Updated last year
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆849Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆985Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆508Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆694Updated 4 months ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆763Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆729Updated last year
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆509Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆408Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆305Updated 5 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,126Updated 3 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,061Updated last year
- C# Based Universal API Unhooker☆394Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆636Updated last year
- A .NET Framework 4.0 Windows Agent☆461Updated 3 weeks ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆939Updated 2 years ago
- The Hunt for Malicious Strings☆1,148Updated 2 years ago
- Various ways to execute shellcode☆476Updated 10 months ago
- Simple & Powerful PowerShell Script Obfuscator☆541Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆901Updated 7 months ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆446Updated last year
- Bypass AMSI by patching AmsiScanBuffer☆255Updated 3 years ago
- Various Cobalt Strike BOFs☆604Updated 2 years ago
- ☆913Updated 3 weeks ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆349Updated last year
- Nim-based assembly packer and shellcode loader for opsec & profit☆459Updated last year
- PIC lsass dumper using cloned handles☆579Updated 2 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆212Updated 3 years ago