redskal / obfuscatxor
Near compile-time string obfuscation for Golang
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for obfuscatxor
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆16Updated 3 months ago
- Ransomware written in go, encrypt - decrypt.☆15Updated 4 months ago
- Unhook Ntdll.dll, Go & C++.☆14Updated 4 months ago
- Load and execute a common object file format (COFF) in the current process☆25Updated 8 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆24Updated 5 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆9Updated 3 months ago
- Golang Implementation of Hell's gate☆15Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆18Updated 3 months ago
- convert compatible dlls to shellcode with sRDI. I don't remember where this came from, so if you recognize the code, let me know and I'll…☆12Updated 7 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆23Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆40Updated 8 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- BOF for C2 framework☆40Updated last week
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- a stage1 DLL loader with sleep obfuscation☆32Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 6 months ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- ☆37Updated 3 weeks ago
- BYOVD collection☆20Updated 8 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 4 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆21Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- A pure C version of SymProcAddress☆23Updated 8 months ago
- string encryption in Nim☆17Updated 5 months ago
- ☆47Updated last year
- 「⚙ ️」Detect which native Windows API's (NtAPI) are being hooked☆37Updated last year
- Small tool to play with IOCs caused by Imageload events☆37Updated last year