tehstoni / LexiCrypt
Shellcode encryptor using a substitution cipher with a randomly generated key.
☆87Updated this week
Alternatives and similar repositories for LexiCrypt:
Users that are interested in LexiCrypt are comparing it to the libraries listed below
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆56Updated 4 months ago
- ☆59Updated this week
- Construct the payload at runtime using an array of offsets☆59Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆44Updated 9 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆92Updated last year
- ☆128Updated 4 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆82Updated 6 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 8 months ago
- Sleep obfuscation☆174Updated this week
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆52Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 5 months ago
- "Service-less" driver loading☆143Updated 2 weeks ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆112Updated 2 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 7 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆50Updated 11 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆101Updated this week
- Section-based payload obfuscation technique for x64☆59Updated 4 months ago
- ☆118Updated last year
- Shellcode loader☆57Updated 3 weeks ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆119Updated 4 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆81Updated this week
- Indirect Syscall with TartarusGate Approach in Go☆72Updated last week
- A Mythic Agent written in PIC C.☆141Updated 2 weeks ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆186Updated last week
- ☆90Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆56Updated 4 months ago
- Just another C2 Redirector using CloudFlare.☆79Updated 7 months ago