IPObfuscator
IP obfuscator
Converts an IP address to various obfuscated forms using bitwise operations
A simple tool to convert the IP to a DWORD IP
138 stars
9 watching
46 forks
Language: C
last commit: over 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
d35ha/callobfuscator | Tools for modifying Windows API imports to evade analysis and detection by static/dynamic analysis tools. | 981 |
vysecurity/ipfuscator | A tool to convert IP addresses to alternative formats and inject them into commands like ping. | 352 |
cbeuw/goquiet | Obfuscates Shadowsocks traffic to mimic HTTPS and evades deep packet inspection | 821 |
bonnetn/vba-obfuscator | A tool to protect VBA macros by obfuscating their code to evade antivirus signatures | 150 |
osandamalith/skypefreak | A forensic tool for analyzing Skype data | 66 |
bc-security/beginners-guide-to-obfuscation | A beginner's guide to evading detection by employing obfuscation techniques in PowerShell and .NET payloads | 1,010 |
usemuffin/obfuscate | A plugin for CakePHP that provides primary key obfuscation using various strategies | 36 |
bashfuscator/bashfuscator | A tool to generate obfuscated Bash code for evading detection in Linux systems | 1,660 |
hack2fun/bypassav | A tool for generating obfuscated executable files to evade antivirus detection | 899 |
osiell/odoorpc | A Python module providing an easy way to interact with Odoo servers through RPC. | 72 |
1an0rmus/tekdefense-automater | Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 534 |
dhimmel/obonet | A Python package that reads OBO-formatted ontologies into networkx MultiDiGraphs | 136 |
sebest/xff | A middleware package to parse and extract client IP addresses from HTTP headers | 98 |
mrphrazer/r2con2020_deobfuscation | Automated deobfuscation tool using symbolic execution and SMT solving to remove obfuscated code from malware | 76 |
alxs009/panda-deobfuscator | A tool for analyzing and deobfuscating binary executables by manipulating their code and data structures | 5 |