tehstoni / LexiCryptLinks
Shellcode encryptor using a substitution cipher with a randomly generated key.
☆142Updated 10 months ago
Alternatives and similar repositories for LexiCrypt
Users that are interested in LexiCrypt are comparing it to the libraries listed below
Sorting:
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆132Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆163Updated 4 months ago
- Stage 0☆167Updated 11 months ago
- Obex – Blocking unwanted DLLs in user mode☆275Updated 2 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 4 months ago
- Our Tips&Tricks☆127Updated 10 months ago
- Generate an Alphabetical Polymorphic Shellcode☆133Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- ☆157Updated 6 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆269Updated 2 months ago
- Payload encoding utility to effectively lower payload entropy.☆120Updated 8 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Enumerate active EDR's on the system☆146Updated 2 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- Ghosting-AMSI☆220Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆136Updated 3 months ago
- A PoC for Early Cascade process injection technique.☆201Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆89Updated 7 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆186Updated 7 months ago
- RunPE implementation with multiple evasive techniques☆253Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆234Updated last year
- A Mythic Agent written in PIC C.☆205Updated 10 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- Sleep obfuscation☆252Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆244Updated this week