From b352f075255d10e939bc9a5f36693cd3120f3662 Mon Sep 17 00:00:00 2001 From: Meitar M Date: Thu, 17 Aug 2017 16:14:40 -0400 Subject: [PATCH] Add UniByAv, fix typo in Hyperion runtime encryptor. --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index d7f707f..d85fcd6 100644 --- a/README.md +++ b/README.md @@ -253,10 +253,11 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea ### Defense Evasion Tools * [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions. * [shellsploit](https://github.com/Exploit-install/shellsploit-framework) - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders. -* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encrypter for 32-bit portable executables ("PE `.exe`s"). +* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE `.exe`s"). * [AntiVirus Evasion Tool (AVET)](https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software. * [peCloak.py](https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/) - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection. * [peCloakCapstone](https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool. +* [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key. ### Hash Cracking Tools * [John the Ripper](http://www.openwall.com/john/) - Fast password cracker.