BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆44Jul 6, 2025Updated 8 months ago
Alternatives and similar repositories for BypassIT
Users that are interested in BypassIT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Updated this week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆55Mar 8, 2025Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- ☆48Dec 5, 2025Updated 3 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 6 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆26Apr 21, 2025Updated 11 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- BOF with Synthetic Stackframe☆235Oct 30, 2025Updated 4 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆18Updated this week
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- ☆147Nov 6, 2025Updated 4 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- ☆26Apr 1, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆126Jan 27, 2025Updated last year