A shellcode crypto-packing tool for PoC (used with msfvenom payloads)
☆17Feb 10, 2023Updated 3 years ago
Alternatives and similar repositories for crypter
Users that are interested in crypter are comparing it to the libraries listed below
Sorting:
- ☆13Nov 27, 2020Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。☆41Mar 24, 2021Updated 4 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Sep 1, 2022Updated 3 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- rockyou.txt the famous wordlist for password cracking☆30Apr 7, 2025Updated 10 months ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- arp-poison (aka arp spoof) tool☆41Apr 9, 2013Updated 12 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- A Midi-to-SVG/PDF converter for various music boxes.☆11Feb 1, 2026Updated last month
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Sep 27, 2021Updated 4 years ago
- List of Awesome Excel4.0/XLM tricks and functions useful for Red Team and Blue Team. This list is for anyone wishing to learn about Excel…☆37Apr 27, 2021Updated 4 years ago
- Extended Bitcoin Clipper from Nyan Cat☆32Aug 15, 2020Updated 5 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- ☆11Mar 11, 2021Updated 4 years ago