40sp3l / ByDeF
Generate an undetectable PE ( .exe ), which bypasses windows defender / AV
☆70Updated last month
Alternatives and similar repositories for ByDeF
Users that are interested in ByDeF are comparing it to the libraries listed below
Sorting:
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆127Updated 4 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆140Updated 6 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 6 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆62Updated 6 months ago
- A collection of config files for linux focusing on hackthebox theme☆44Updated 4 months ago
- PowerShell Obfuscator☆174Updated 11 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 7 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 3 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆108Updated last month
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆175Updated 3 weeks ago
- ☆52Updated 3 months ago
- A Simple JS code to keylogger data and send it to the personal server☆30Updated 4 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆107Updated last month
- Automation tool to testing and confirm the xss vulnerability.☆247Updated last month
- ☆62Updated last year
- PDF dropper Red Team Scenairos☆207Updated 9 months ago
- GeoServer Remote Code Execution☆78Updated last month
- ☆43Updated 2 weeks ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆121Updated 10 months ago
- ☆62Updated last month
- A list of all Active Directory machines from HackTheBox☆58Updated 2 weeks ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆91Updated 7 months ago
- A fast subdomain takeover tool☆80Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆275Updated last month
- ☆84Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 5 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆75Updated this week
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆93Updated last month