namdevel / apollyon-decoder
Deobfuscate Python file Obfuscated by Apollyon
☆8Updated 2 years ago
Alternatives and similar repositories for apollyon-decoder:
Users that are interested in apollyon-decoder are comparing it to the libraries listed below
- Deobfuscates python code that has been obfuscated using https://development-tools.net/python-obfuscator/☆10Updated last year
- Deobfuscate python code obfuscated by Berserker☆13Updated 2 years ago
- Decompiler of python executable files created in pyinstaller and pyarmor and decompiler of .pyc files☆9Updated 2 years ago
- ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshells☆11Updated 4 months ago
- ☆11Updated 4 years ago
- Unpacks java-to-exe files converted by JWrapper☆12Updated 2 years ago
- an open source python deobfuscator for pyobfuscate.com☆20Updated 6 months ago
- a program can deobfuscate hyperion python to original code☆24Updated 3 months ago
- ☆14Updated 3 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- Joker Botnet Source LEAKED☆12Updated 3 years ago
- 🛠️ Simple EXE-File Pumper, written in C#☆15Updated 4 years ago
- A google dork parser that bypasses captcha's automatically.☆13Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 3 months ago
- Spotify Email Valid Checker Proxyless (No Proxies Needed) V2 By ARON-TN☆11Updated last year
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆11Updated 2 years ago
- ☆9Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆40Updated 2 years ago
- ☆14Updated last year
- Trojan written in C++ for Windows☆14Updated 10 months ago
- ☆15Updated 2 years ago
- This python performs brute force attack for mail access☆18Updated 10 months ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago