4osp3l / ByDeFLinks
Generate an undetectable PE ( .exe ), which bypasses windows defender / AV
☆121Updated 4 months ago
Alternatives and similar repositories for ByDeF
Users that are interested in ByDeF are comparing it to the libraries listed below
Sorting:
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆73Updated 11 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆153Updated 4 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆127Updated last year
- A fast subdomain takeover tool☆84Updated last year
- Docker Remote API Scanner and Exploit☆179Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆209Updated 5 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆105Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆245Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 9 months ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆136Updated 4 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- PowerShell Obfuscator☆207Updated last month
- PDF dropper Red Team Scenairos☆221Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆68Updated last year
- Reverse shell that can bypass windows defender detection☆169Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆50Updated 3 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- GeoServer Remote Code Execution☆81Updated 5 months ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆154Updated 2 months ago
- ☆65Updated last year
- ☆68Updated 8 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated last year
- ☆74Updated 6 months ago
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆41Updated 6 months ago