Windows shellcode encoding and encrypting tool
☆20May 4, 2022Updated 3 years ago
Alternatives and similar repositories for encryptor
Users that are interested in encryptor are comparing it to the libraries listed below
Sorting:
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- 冰蝎 哥斯拉 WebShell bypass☆15May 10, 2022Updated 3 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- ☆33Jan 23, 2025Updated last year
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- RTL8814AU drivers with monitor mode, frame injection and AP+Jammer☆14Apr 10, 2020Updated 5 years ago
- ☆11Mar 14, 2019Updated 6 years ago
- Shellcode execution for memflow☆13Apr 11, 2022Updated 3 years ago
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆10Jan 30, 2022Updated 4 years ago
- ☆15Nov 24, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- 简单版的PE加载器☆12Aug 11, 2020Updated 5 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- ETS5 Password Recovery Tool is a PoC for CVE-2021-36799☆33Jul 23, 2022Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago