Malware traffic obfuscation library
☆37Jul 24, 2025Updated 8 months ago
Alternatives and similar repositories for netescape
Users that are interested in netescape are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 10 months ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 5 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- ☆26Aug 11, 2025Updated 7 months ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 7 months ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆18Sep 20, 2024Updated last year
- ☆16Mar 24, 2019Updated 7 years ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- ☆41Feb 20, 2025Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- 一款简单的后渗透免杀加载器,Bypass AV/EDR☆93Oct 26, 2024Updated last year
- Orsted C2 Framework☆115Feb 9, 2026Updated last month
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 9 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24May 10, 2021Updated 4 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- General Purpose OpSec Server☆112Mar 13, 2026Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆212Mar 7, 2026Updated 2 weeks ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆210Dec 17, 2025Updated 3 months ago
- Cyber Security Article Gather By 风起☆22Mar 13, 2025Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated 2 weeks ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- Enumerate your Kubernetes cluster with just 1 command☆11Mar 11, 2026Updated last week