Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.
☆20Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for Antivirus-Evasion-Py2exe
Users that are interested in Antivirus-Evasion-Py2exe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- A fully undetectable payload generator in python. working in 2021.☆16Sep 26, 2023Updated 2 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Bypass Windows Defender with py2exe from memory.☆39Feb 10, 2022Updated 4 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- ☆37May 8, 2022Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Multilayered secret detection tool☆42Feb 11, 2026Updated 2 months ago
- USB connection trigger.☆11Jul 5, 2022Updated 3 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Convert auditd logs to json format☆10Apr 3, 2019Updated 7 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- A tool suite for use during system assessments.☆35May 29, 2025Updated 10 months ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Feb 25, 2022Updated 4 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Swipe to dismiss in Jetpack Compose☆10Aug 21, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 4 years ago
- Utility to remove digital code signature from binary PE files in Windows.☆17Apr 25, 2021Updated 4 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- Releases materials for ConnectyCube JS SDK platform https://connectycube.com☆10Mar 26, 2026Updated 3 weeks ago
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- Leveraging LLM to generate Java deserialization chains☆72Mar 12, 2026Updated last month
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- VM-Series templates for Google Cloud Platform☆11Jan 15, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A domain/ip fuzzing tool for vulnerability mining☆13Jan 2, 2015Updated 11 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago
- GPT fdisk partitioning tool for use under UEFI environments.☆17Nov 27, 2024Updated last year
- Hybrid n-layer file encryption and decryption algorithm.☆12Aug 24, 2024Updated last year
- PowerShell Obfuscation and Data Science☆183May 4, 2022Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆123Apr 9, 2022Updated 4 years ago