l00sy4 / ShellterSkelter
Swiss army knife for payload encryption and obfuscation
☆22Updated last year
Alternatives and similar repositories for ShellterSkelter:
Users that are interested in ShellterSkelter are comparing it to the libraries listed below
- ☆27Updated 3 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- shell code example☆33Updated 3 weeks ago
- Rust template/library for implementing your own COFF loader☆49Updated 2 months ago
- A work in progress BOF/COFF loader in Rust☆47Updated 2 years ago
- Rewrite to fit my needs☆27Updated 8 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆22Updated last year
- ☆59Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆25Updated 2 months ago
- ☆29Updated 3 months ago
- ForsHops☆35Updated last week
- A process injection technique using only thread context manipulation☆27Updated last year
- In-memory hiding technique☆47Updated 2 months ago
- Modify managed functions from unmanaged code☆51Updated last year
- ☆36Updated 2 years ago
- Proxy function calls through the thread pool with ease☆23Updated last month
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆44Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆49Updated last year
- ☆48Updated last year
- miscellaneous codes☆35Updated last year
- stack spoofing☆81Updated 4 months ago
- An In-memory Embedding of CPython☆26Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- ☆21Updated last month