Hi, I'm André, AKA AndreCrafts.
(You may also know me from my previous work as WafflesExploits).
(You may also know me from my previous work as WafflesExploits).
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …
Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to the API or save them to a file for later use.
A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.
Multi-threaded Login brute-forcer with built-in CSRF token bypass
An improved version of Python's http.server, created for redirection purposes.