th3hack3rwiz / Scantime-Crypter
The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malware from the disk while creating another output file to the disk. The Crypter will then extract the contents from the malware and obfuscate them using XOR encryption algorithm. The obfuscated contents will the…
☆14Updated 4 years ago
Alternatives and similar repositories for Scantime-Crypter:
Users that are interested in Scantime-Crypter are comparing it to the libraries listed below
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Antiscan.me automatization script☆26Updated 10 months ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- ☆24Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆11Updated 2 months ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago