Hi, I'm André, AKA AndreCrafts.
(You may also know me from my previous work as WafflesExploits).
(You may also know me from my previous work as WafflesExploits).
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …
Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to the API or save them to a file for later use.
A dynamic HTTP/s Payload Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders.
Bypass CSRF Token Protection with a Multi-threaded Login Bruteforcer
An improved version of Python's http.server, created for redirection purposes.