Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.
☆185Jan 27, 2025Updated last year
Alternatives and similar repositories for windows-command-line-obfuscation
Users that are interested in windows-command-line-obfuscation are comparing it to the libraries listed below
Sorting:
- ☆208Feb 24, 2022Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173May 5, 2021Updated 4 years ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- Managed code hooking template.☆134Nov 19, 2021Updated 4 years ago
- Load any Beacon Object File using Powershell!☆260Dec 9, 2021Updated 4 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- PowerShell Script Obfuscator☆596Nov 2, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆263Apr 24, 2021Updated 4 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,199Apr 16, 2025Updated 10 months ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆228Jul 30, 2021Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Lockless allows for the copying of locked files.☆254Apr 30, 2021Updated 4 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- PoC to interact with local/remote registry hives through WMI☆86Jun 14, 2020Updated 5 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆439Jan 8, 2022Updated 4 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆405Feb 8, 2023Updated 3 years ago
- ☆433Aug 17, 2022Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122May 29, 2024Updated last year
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- ☆615Jul 21, 2025Updated 7 months ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,254Aug 27, 2023Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago