Pinned Repositories
amber
Reflective PE packer.
Cminer
Cminer is a tool for enumerating the code caves in PE files.
deoptimizer
Evasion by machine code de-optimization.
EGESPLOIT
EGESPLOIT is a golang library for malware development
evilreplay
Seamless remote browser session control
HERCULES
HERCULES is a special payload generator that can bypass antivirus softwares.
Hook_API
Assembly block for hooking windows API functions.
IAT_API
Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
WSAAcceptBackdoor
Winsock accept() Backdoor Implant.
EgeBalci's Repositories
EgeBalci/HERCULES
HERCULES is a special payload generator that can bypass antivirus softwares.
EgeBalci/WSAAcceptBackdoor
Winsock accept() Backdoor Implant.
EgeBalci/zippo
Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.
EgeBalci/urlscan-go
URLScan Go API client
EgeBalci/DDOS-RootSec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
EgeBalci/kopycat
Linux Kernel module-less implant (backdoor)
EgeBalci/MicroBackdoor
Small and convenient C2 tool for Windows targets
EgeBalci/RAASNet
Open-Source Ransomware As A Service for Linux, MacOS and Windows
EgeBalci/SARA
SARA - Simple Android Ransomware Attack
EgeBalci/SleepyCrypt
A shellcode function to encrypt a running process image when sleeping.
EgeBalci/ToRat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
EgeBalci/tracee
Linux Runtime Security and Forensics using eBPF
EgeBalci/llvm-string-obfuscator
LLVM String Obfuscator
EgeBalci/archcraft
// Source : ISO
EgeBalci/Cobalt-Wipe
Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)
EgeBalci/DarkLoadLibrary
LoadLibrary for offensive operations
EgeBalci/ExecuteAssembly
Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash).
EgeBalci/ghost
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
EgeBalci/gsocket-relay
Global Socket Server
EgeBalci/HackBrowserData
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
EgeBalci/hidden
Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc
EgeBalci/MacOSX-SDKs
A collection of those pesky SDK folders: MacOSX10.1.5.sdk thru MacOSX11.3.sdk
EgeBalci/mettle
This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.
EgeBalci/NorthStarC2
Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalware #CnC #infosec #offensivesecurity #Trojan
EgeBalci/reqstress
a benchmarking&stressing tool that can send raw HTTP requests
EgeBalci/RunPE-In-Memory
Run a Exe File (PE Module) in memory (like an Application Loader)
EgeBalci/s6_pcie_microblaze
PCI Express DIY hacking toolkit for Xilinx SP605
EgeBalci/TitanLdr
Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH
EgeBalci/Trufflehog-Chrome-Extension
EgeBalci/xserver-web-vnc
Run a web VNC client to interact with and view your local xserver