URL-obfuscator
mortar
URL-obfuscator | mortar | |
---|---|---|
1 | 3 | |
159 | 1,348 | |
- | 1.0% | |
0.0 | 5.7 | |
over 1 year ago | 5 months ago | |
Python | Pascal | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
URL-obfuscator
mortar
- Mortar Loader: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR) - Mortar Loader performs encryption and decryption of selected binary inside the memory streams and execute it directly with out writing any malicious indicator into the hard-drive
-
mortar: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
it is now fixed, it was an issue with the encryptor.https://github.com/0xsp-SRD/mortar/issues/1
What are some alternatives?
Storm-Breaker - Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
DefenderCheck - Identifies the bytes that Microsoft Defender flags on.
chameleon - PowerShell Script Obfuscator
TelemetrySourcerer - Enumerate and disable common sources of telemetry used by AV/EDR.
HiddenEye-Legacy - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Veil - Veil 3.1.X (Check version info in Veil at runtime)
adversarial-robustness-toolbox - Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
PhishingKitTracker - Let's track phishing kits to give to research community raw material to study !
Payload-Download-Cradles - This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
Conf-thief - A Red Team tool for exfiltrating sensitive data from Confluence pages.
DeathSleep - A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.