Obfuscate payloads using IPv4, IPv6, MAC or UUID strings
☆23Feb 17, 2024Updated 2 years ago
Alternatives and similar repositories for SharpObfuscate
Users that are interested in SharpObfuscate are comparing it to the libraries listed below
Sorting:
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- ☆109Feb 17, 2025Updated last year
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Mar 31, 2019Updated 6 years ago
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated last month
- ☆14Jul 26, 2025Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated last month
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Trionic 5/7/8 CANbus flasher with J2534 support automotive, canbus-communications, saab☆37May 16, 2025Updated 9 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- ☆12Jan 25, 2020Updated 6 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14May 2, 2020Updated 5 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Detection Engineering Tools☆24Updated this week
- Hactivation via MobileGestalt POC☆29Nov 15, 2025Updated 3 months ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43May 18, 2024Updated last year