tehstoni / LexiCrypt
Shellcode encryptor using a substitution cipher with a randomly generated key.
☆120Updated last month
Alternatives and similar repositories for LexiCrypt:
Users that are interested in LexiCrypt are comparing it to the libraries listed below
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆84Updated 2 months ago
- Sleep obfuscation☆209Updated 2 months ago
- Stage 0☆153Updated 2 months ago
- "Service-less" driver loading☆148Updated 3 months ago
- Our Tips&Tricks☆111Updated 3 weeks ago
- ☆142Updated 7 months ago
- ☆148Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆62Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post☆207Updated 4 months ago
- Payload encoding utility to effectively lower payload entropy.☆110Updated 3 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆58Updated 8 months ago
- A Mythic Agent written in PIC C.☆175Updated last month
- This repository implements Threadless Injection in C☆160Updated last year
- Windows rootkit designed to work with BYOVD exploits☆168Updated last month
- Hide your P/Invoke signatures through other people's signed assemblies☆204Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- A PoC for Early Cascade process injection technique.☆162Updated last month
- ☆136Updated 4 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 10 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆231Updated 3 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆116Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 7 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆194Updated 9 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆193Updated last month
- Analyse MSI files for vulnerabilities☆124Updated 6 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- Automated .NET AppDomain hijack payload generation☆120Updated last month
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆189Updated 2 months ago