Obfuscate payloads using IPv4, IPv6, MAC or UUID strings
☆23Feb 17, 2024Updated 2 years ago
Alternatives and similar repositories for SharpObfuscate
Users that are interested in SharpObfuscate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated last month
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- A Delphi symbol name recovery tool for reverse engineers.☆24Jan 17, 2026Updated 2 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 2 months ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 7 years ago
- ☆14Jul 26, 2025Updated 8 months ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆111Feb 17, 2025Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 9 months ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Detection Engineering Tools☆25Updated this week
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Downloading Spotify Playlists☆28Jan 8, 2026Updated 3 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated last month
- Tinder user searcher and DB creation. Proof of concept for Tinder security team☆19Mar 26, 2019Updated 7 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆15May 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Trionic 5/7/8 CANbus flasher with J2534 support automotive, canbus-communications, saab☆36May 16, 2025Updated 10 months ago
- A modern and open source .NET obfuscation engine for everyone.☆23Nov 30, 2024Updated last year
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Different methods to get current username without using whoami☆186Feb 12, 2024Updated 2 years ago
- ☆50Nov 26, 2025Updated 4 months ago
- Vulnserver exploits☆15May 1, 2020Updated 5 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago