Generate an undetectable PE ( .exe ), which bypasses windows defender / AV
☆131May 12, 2025Updated 9 months ago
Alternatives and similar repositories for ByDeF
Users that are interested in ByDeF are comparing it to the libraries listed below
Sorting:
- Steganography Detection Framework☆13Jan 8, 2025Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆210Mar 22, 2025Updated 11 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆183Mar 29, 2025Updated 11 months ago
- ☆15Apr 17, 2025Updated 10 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- 🌐 [ New Chrome Cookies ] AVM-Tools - Advanced FUD Stealer. Features: Credential Extraction (Passwords, Cookies, Autofill), Discord Sessi…☆27Updated this week
- ☆13Mar 6, 2025Updated 11 months ago
- WebSocket and SQL Injection Exploit Script☆40Feb 27, 2025Updated last year
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆18Apr 30, 2025Updated 10 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- ☆48Oct 14, 2025Updated 4 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- ☆43Sep 28, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆20Apr 24, 2025Updated 10 months ago
- ☆39May 4, 2025Updated 10 months ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- External recon toolkit☆55Dec 29, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- 0xJS is an AI-powered JavaScript Security Tool☆34Feb 22, 2026Updated last week
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Oct 18, 2025Updated 4 months ago
- Simple Project that Extracts PE Information.☆21Apr 4, 2025Updated 11 months ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- Shellcode loader☆101Nov 24, 2024Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 8 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆221Nov 3, 2025Updated 4 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆344Dec 5, 2025Updated 2 months ago
- command control framework☆32Updated this week
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- CrlfiX☆21Jan 30, 2025Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago