Malware traffic obfuscation library
☆39Jul 24, 2025Updated 7 months ago
Alternatives and similar repositories for netescape
Users that are interested in netescape are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 7 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 4 months ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 9 months ago
- ☆25Jan 8, 2024Updated 2 years ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆19Sep 20, 2024Updated last year
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- ☆16Mar 24, 2019Updated 6 years ago
- ☆26Aug 11, 2025Updated 6 months ago
- Orsted C2 Framework☆114Feb 9, 2026Updated 3 weeks ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 8 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆38Jul 23, 2025Updated 7 months ago
- 一款简单的后渗透免杀加载器,Bypass AV/EDR☆91Oct 26, 2024Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Cyber Security Article Gather By 风起☆23Mar 13, 2025Updated 11 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- wsnet☆26Feb 19, 2026Updated last week
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 6 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Sep 11, 2025Updated 5 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24May 10, 2021Updated 4 years ago
- Remote-shellcode loader in pure Rust☆25Jan 7, 2025Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆211Sep 20, 2025Updated 5 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆502Jan 23, 2026Updated last month
- This project is move advanced version of https://github.com/WKL-Sec/HiddenDesktop☆50Jan 11, 2026Updated last month
- ☆156Oct 28, 2025Updated 4 months ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Feb 2, 2026Updated last month
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 8 months ago