mortar
URL-obfuscator
mortar | URL-obfuscator | |
---|---|---|
3 | 1 | |
1,348 | 159 | |
1.0% | - | |
5.7 | 0.0 | |
4 months ago | over 1 year ago | |
Pascal | Python | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mortar
- Mortar Loader: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR) - Mortar Loader performs encryption and decryption of selected binary inside the memory streams and execute it directly with out writing any malicious indicator into the hard-drive
-
mortar: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
it is now fixed, it was an issue with the encryptor.https://github.com/0xsp-SRD/mortar/issues/1
URL-obfuscator
What are some alternatives?
DefenderCheck - Identifies the bytes that Microsoft Defender flags on.
Storm-Breaker - Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
TelemetrySourcerer - Enumerate and disable common sources of telemetry used by AV/EDR.
chameleon - PowerShell Script Obfuscator
Veil - Veil 3.1.X (Check version info in Veil at runtime)
HiddenEye-Legacy - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
adversarial-robustness-toolbox - Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Payload-Download-Cradles - This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
PhishingKitTracker - Let's track phishing kits to give to research community raw material to study !
Conf-thief - A Red Team tool for exfiltrating sensitive data from Confluence pages.
DeathSleep - A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.