Metamorphic engine written in Rust.
☆19May 15, 2022Updated 3 years ago
Alternatives and similar repositories for dolos
Users that are interested in dolos are comparing it to the libraries listed below
Sorting:
- Self-modifying malware in Rust☆29Sep 14, 2022Updated 3 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- ☆10Sep 3, 2021Updated 4 years ago
- ☆12May 30, 2019Updated 6 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- An esoteric programming language with just two data types: null and tape☆11Jan 31, 2024Updated 2 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- ☆11Apr 15, 2021Updated 4 years ago
- Reverse SSH C2☆35Sep 19, 2025Updated 5 months ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Benchmark suite for real-time behavior, including interrupt latency and context switching times☆15Oct 20, 2021Updated 4 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆19Sep 30, 2022Updated 3 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 8 months ago
- managed debugger for IronPython☆31Apr 8, 2009Updated 16 years ago
- ☆13Jan 19, 2024Updated 2 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- Python library to automate gdb debugging☆20Jun 26, 2025Updated 8 months ago
- An api and backend code to gather the impacts of diverse scholarly products online.☆58Nov 19, 2014Updated 11 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆17Dec 31, 2025Updated 2 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago