Giter Club home page Giter Club logo

chronoss3's Projects

ivy icon ivy

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.

jasmin-ransomware icon jasmin-ransomware

Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.

jlaive icon jlaive

.NET Antivirus Evasion Tool (Exe2Bat)

joecrypter icon joecrypter

Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.

killer icon killer

Is a tool created to evade AVs and EDRs or security tools.

kittystager icon kittystager

KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.

lessmsi icon lessmsi

A tool to view and extract the contents of an Windows Installer (.msi) file.

lightsout icon lightsout

Generate an obfuscated DLL that will disable AMSI & ETW

limba icon limba

compile-time control flow obfuscation using mba

limelighter icon limelighter

A tool for generating fake code signing certificates or signing real ones

lunar icon lunar

A lightweight native DLL mapping library that supports mapping directly from memory

masm_shc icon masm_shc

A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.

mem64 icon mem64

Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.

merlin icon merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

mortar icon mortar

evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)

mousedistance icon mousedistance

Measure the distance the cursor have been moved to bypass sandboxes

net-obfuscate icon net-obfuscate

Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI

netrenamer icon netrenamer

Simple tool to obfuscate/rename .NET module's methods, fields, classes and more using AsmResolver.

nidhogg icon nidhogg

Nidhogg is an all-in-one simple to use rootkit for red teams.

nimcrypt2 icon nimcrypt2

.NET, PE, & Raw Shellcode Packer/Loader Written in Nim

niximports icon niximports

A .NET malware loader, using API-Hashing to evade static analysis

nopyfy_ransomware icon nopyfy_ransomware

Open source Ransomware with advanced Features. It is also compatible with offline-Victim.

noteme icon noteme

ELF packer/crypter that aims to create hardened and stealthy troyans

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.