wsummerhill / Python-Crypter
Custom Python shellcode encryptor and obfuscator
☆12Updated 11 months ago
Alternatives and similar repositories for Python-Crypter:
Users that are interested in Python-Crypter are comparing it to the libraries listed below
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 4 months ago
- LSTAR - CobaltStrike Translated to EN☆13Updated last year
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- Rewrite to fit my needs☆27Updated 8 months ago
- ☆48Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 3 months ago
- ☆59Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A pure C version of SymProcAddress☆26Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 10 months ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆47Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆20Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆29Updated 6 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- Excel Add In Payload Generator☆10Updated last year