公司简介网站怎么做wordpress app中文版下载
🟢 绝大部分无法直接生成免杀木马,开发、测试免杀时会用到。
|   工具简称  |   概述  |   工具来源  |   下载路径  | 
|   x64dbg 中文版安装程序(Jan 6 2024).exe  |   52pojie  | ||
|   hellshell  |   官方的加密或混淆shellcode  |   github  |   Releases · ORCA / HellShell · GitLab  | 
|   hellshell-网络版本  |   github  |   GitHub - SenSecurity/Hellshell-with-more-fuctionality: HellShell with More functionality  | |
|   Dependencies.AheadLib.Plugin  |   在dependencies上额外加了导出函数  |   看雪  |   [原创]我在Dependencies项目上做了个Aheadlib插件-编程技术-看雪-安全社区|安全招聘|kanxue.com  | 
|   Dependencies  |   github  |   GitHub - lucasg/Dependencies: A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.  | |
|   ChangeTimestamp.exe  |   更改时间戳  | ||
|   sgn_windows_amd64_2.0.1  |   对二进制文件编码免杀shellcode  |   github  |   GitHub - EgeBalci/sgn: Shikata ga nai (仕方がない) encoder ported into go with several improvements  | 
|   Resource Hacker  | |||
|   BeaconEye_x64  |   通过扫描CobaltStrike中的内存特征,并进行Beacon Config扫描解析出对应的Beacon信息  |   github  |   Releases · CCob/BeaconEye · GitHub  | 
|   Hunt-Sleeping-Beacons  |   github  |   GitHub - thefLink/Hunt-Sleeping-Beacons: Aims to identify sleeping beacons  | |
|   yara-master-2298-win64  |   分类恶意软件样本的工具  |   github  |   GitHub - VirusTotal/yara: The pattern matching swiss knife  | 
|   Windows_Trojan_CobaltStrike.yar  |   Elastic安全公司开源检测CobaltStrike的yara规则  |   github  |   protections-artifacts/yara/rules/Windows_Trojan_CobaltStrike.yar at main · elastic/protections-artifacts · GitHub  | 
|   hollows_hunter64  |   github  |   GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).  | |
|   arsenal_kit  |   telegram  | ||
|   DLLSpy  |   检测正在运行的进程、服务及其二进制文件中的 DLL 劫持  |   github  | |
|   Process Hacker 2  |   查看进程  | ||
|   Alcatraz  |   没下载, x64 二进制混淆器,能够混淆各种不同的 pe 文件  |   github  |   GitHub - weak1337/Alcatraz: x64 binary obfuscator  | 
|   pestudio-9.58  |   查看文件熵值等信息,逆向等可用  |   官网下载  |   Winitor  | 
|   https://junkcode.gehaxelt.in/  |   垃圾代码生成器,降低熵值  |   github  |   GitHub - gehaxelt/PHP-C---JunkCodeGenerator: A junkcode generator for C++ classes written in PHP  | 
|   sgn_windows_amd64_2.0.1  |   编码shellcode  |   github  | |
|   ChangeTimestamp.exe  |   改时间  | ||
|   SigThief  |   把签名撕取下来  |   github  |   GitHub - secretsquirrel/SigThief: Stealing Signatures and Making One Invalid Signature at a Time  | 
|   Restorator2018  |   伪造图标  |   https://www.sqlsec.com/tools.html  |   https://www.sqlsec.com/tools.html  | 
|   BeCyIconGrabber.exe  |   伪造图标  |   https://www.sqlsec.com/tools.html  |   https://www.sqlsec.com/tools.html  | 
|   SourcePoint  |   自生成Malleable C2 profile  |   github  |   GitHub - Tylous/SourcePoint: SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.  | 
|   S-inject  |   DLL+Shellcode的Windows注入免杀工具  |   github  |   GitHub - Joe1sn/S-inject: 支持x86/x64的DLL和Shellcode 的Windows注入的免杀工具,支持图形化界面  | 
|   RingQ  |   免杀,exe2shellcode  |   github  |   GitHub - T4y1oR/RingQ: 一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader  | 
|   pe2shc.exe  |   pe_to_shellcode  |   github  |   GitHub - hasherezade/pe_to_shellcode: Converts PE into a shellcode  | 
