Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
☆148Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for VisualBasicObfuscator
Users that are interested in VisualBasicObfuscator are comparing it to the libraries listed below
Sorting:
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆539Sep 18, 2022Updated 3 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- 2018 School project - PoC of malware code obfuscation in Word macros☆153Sep 27, 2021Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,112Jun 10, 2024Updated last year
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 5 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- VBA Obfuscation Tools combined with an MS office document generator☆550Oct 15, 2017Updated 8 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- Run shellcode from resource☆259Dec 13, 2020Updated 5 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆350Jul 3, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Jul 24, 2018Updated 7 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 4 years ago
- A shellcode function to encrypt a running process image when sleeping.☆339Sep 11, 2021Updated 4 years ago
- C# Based Universal API Unhooker☆409Feb 18, 2022Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆124Sep 6, 2022Updated 3 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,318Jan 18, 2021Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago