su1s / encryptor
Windows shellcode encoding and encrypting tool
☆20Updated 2 years ago
Related projects: ⓘ
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 2 months ago
- replace the shellcode chatacters so that reduce the entropy☆13Updated last year
- My personal shellcode loader☆33Updated last year
- A rework of CMLuaUtil AutoElevated☆23Updated last year
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆30Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆52Updated 4 months ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆52Updated last year
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- MappingInjection via csharp☆37Updated 2 years ago
- ☆39Updated last year
- Inject shellcode into process via "EarlyBird"☆24Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆36Updated 2 years ago
- Change hash for a signed pe☆15Updated last year
- ☆21Updated last year
- Load PE via XML Attribute☆28Updated 4 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆36Updated 4 months ago
- PDF Icon File Type Spoofer☆12Updated 2 months ago
- Abuse Xwizard.exe for DLL Side-Loading☆82Updated last year
- A Cobalt Strike memory evasion loader for redteamers☆94Updated last year
- ☆105Updated this week
- Cobaltstrike BOF to unhook any Nt api☆14Updated last year
- This project is an AES loader for c2 shellcode☆12Updated 7 months ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆28Updated 2 years ago
- Bypassing ETW with Csharp☆25Updated 2 years ago
- A simple hidden vnc.☆31Updated 3 years ago
- ☆29Updated this week
- ☆26Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆93Updated last year