redskal / obfuscatxorLinks
Near compile-time string obfuscation for Golang
β12Updated last year
Alternatives and similar repositories for obfuscatxor
Users that are interested in obfuscatxor are comparing it to the libraries listed below
Sorting:
- Troll TaskManager, and play with it .β26Updated last month
- π | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rubyβ10Updated 4 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.β21Updated 10 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.β75Updated 2 months ago
- Indirect Syscall with TartarusGate Approach in Goβ129Updated last month
- Ransomware written in go, encrypt - decrypt.β27Updated 4 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.β21Updated 4 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Executionβ43Updated last year
- Unhook Ntdll.dll, Go & C++.β27Updated 4 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to neβ¦β22Updated 3 months ago
- This project will guide yout to awareness of injection in almost every window API and process.β25Updated 3 years ago
- Shellcode Loader Utilizing ETW Eventsβ65Updated 6 months ago
- ATL.dll and WmiMgmt.msc UAC Bypassβ13Updated 4 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.β73Updated last year
- The best powershell obfuscator ever madeβ111Updated last month
- β12Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assembliesβ38Updated last month
- kernel-mode DLL Injectorβ108Updated 4 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interfaceβ73Updated last month
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similarβ131Updated last year
- Sleep obfuscationβ231Updated 8 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooksβ118Updated 8 months ago
- PoC arbitrary WPM without a process handleβ19Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β84Updated last year
- Generate an Alphabetical Polymorphic Shellcodeβ109Updated 2 weeks ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.β91Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantationβ71Updated last year
- Section-based payload obfuscation technique for x64β64Updated last year
- Good CLR Host with Native patchless AMSI Bypassβ87Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithmβ20Updated 4 months ago