maezyn / dolosView external linksLinks
Metamorphic engine written in Rust.
☆19May 15, 2022Updated 3 years ago
Alternatives and similar repositories for dolos
Users that are interested in dolos are comparing it to the libraries listed below
Sorting:
- ☆10Sep 3, 2021Updated 4 years ago
- ☆11May 30, 2019Updated 6 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆11Jun 29, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆17Sep 30, 2022Updated 3 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- An esoteric programming language with just two data types: null and tape☆11Jan 31, 2024Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated 11 months ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Create a Shell Link a.k.a. Shortcut on Windows from command line☆15Jan 6, 2026Updated last month
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- BitTorrent client written in Scala using Akka☆73Mar 23, 2019Updated 6 years ago
- An api and backend code to gather the impacts of diverse scholarly products online.☆58Nov 19, 2014Updated 11 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- Fixed-point arithmetic in C99☆16Oct 4, 2024Updated last year
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Just another repository for malware development☆13May 12, 2024Updated last year
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- KeyGen is a generator for keys and passwords.☆22Jan 7, 2026Updated last month
- Python library to automate gdb debugging☆20Jun 26, 2025Updated 7 months ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- Utility library for network protocols on the JVM☆12Jan 26, 2026Updated 2 weeks ago
- Offensive security toolkit to obfuscate Python code, stage payloads, and evade defenses☆23Updated this week
- wh cyberspace☆12Oct 1, 2022Updated 3 years ago
- DLL injection with Microsoft detours☆21Dec 9, 2025Updated 2 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆39Jun 20, 2025Updated 7 months ago