th3hack3rwiz / Scantime-Crypter
The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malware from the disk while creating another output file to the disk. The Crypter will then extract the contents from the malware and obfuscate them using XOR encryption algorithm. The obfuscated contents will the…
☆14Updated 3 years ago
Alternatives and similar repositories for Scantime-Crypter:
Users that are interested in Scantime-Crypter are comparing it to the libraries listed below
- Disable Windows Defender All Version☆31Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆11Updated last month
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- the assembly shell and backdoor Trojan☆17Updated 3 years ago
- ☆24Updated last year
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Antiscan.me automatization script☆27Updated 8 months ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago