redskal / obfuscatxor
Near compile-time string obfuscation for Golang
☆13Updated last year
Alternatives and similar repositories for obfuscatxor:
Users that are interested in obfuscatxor are comparing it to the libraries listed below
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆19Updated 8 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆11Updated 7 months ago
- Unhook Ntdll.dll, Go & C++.☆21Updated 8 months ago
- shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually fro…☆9Updated 6 months ago
- Ransomware written in go, encrypt - decrypt.☆18Updated 8 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated last month
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Golang Implementation of Hell's gate☆17Updated last year
- Parent Process ID Spoofing, coded in CGo.☆22Updated 9 months ago
- Proxy function calls through the thread pool with ease☆23Updated last month
- It was a great run, but everything must come to an end. Please don’t contact me. Before I go, here’s a final gift :)☆16Updated this week
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 6 months ago
- Shellcode Loader Utilizing ETW Events☆60Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 8 months ago
- ☆25Updated 2 months ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Sleep Obfuscation☆43Updated 2 years ago
- ☆25Updated 3 months ago
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 10 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆43Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆20Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆20Updated 7 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 4 months ago
- ☆53Updated 2 months ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆71Updated 2 months ago