maltek-labs / Malcode-Obfuscator
Polymorphic code obfuscator for use in Red Team operations
☆30Updated 2 years ago
Alternatives and similar repositories for Malcode-Obfuscator:
Users that are interested in Malcode-Obfuscator are comparing it to the libraries listed below
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- ☆29Updated 2 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- ☆51Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆19Updated 4 years ago
- ☆13Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- ☆35Updated 4 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆53Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago