th3hack3rwiz / Scantime-Crypter
The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malware from the disk while creating another output file to the disk. The Crypter will then extract the contents from the malware and obfuscate them using XOR encryption algorithm. The obfuscated contents will the…
☆14Updated 3 years ago
Alternatives and similar repositories for Scantime-Crypter:
Users that are interested in Scantime-Crypter are comparing it to the libraries listed below
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- ☆24Updated last year
- Bypass Windows defender syscall☆18Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- ☆35Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆11Updated last month
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 9 months ago
- ☆14Updated last year
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- the assembly shell and backdoor Trojan☆17Updated 3 years ago