Sensitive Data Management: Data Discovery and Anonymization toolkit
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
The ultimate AI-powered toolkit for python reverse engineering
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Identifies the bytes that Microsoft Defender flags on.
Evasion by machine code de-optimization.
Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.
Generic PE loader for fast prototyping evasion techniques
Generates position-independent shellcode from .NET assemblies, PE files, scripts (VBScript, JScript), and XSL that runs in memory. Used to e…
Native code virtualizer for x64 binaries
AppLocker-Based EDR Neutralization
Conceal e-mail addresses in a string by replacing their domain
PIC shellcode (C/C++) development toolkit designed for malware developers.
Obfuscate all your TCP connections into HTTP protocol.
IPv6 rate limiting evasion library that allows you to bind sockets to random IP addresses from specified prefixes
go install mvdan.cc/garble@latest # or @master
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
Obfuscate string literals in JavaScript code.
shellcode免杀加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软
15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 on V…
Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all unobf…
Database anonymization, synthetic data generation and logical dump
Library for execution obfuscation, designed to protect memory regions during inactivity or sleep cycles. It leverages thread pool timers, wa…
Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.