CyberSecurityUP / AV-Bypass-codesLinks
Python, C++ and Go
☆22Updated 3 years ago
Alternatives and similar repositories for AV-Bypass-codes
Users that are interested in AV-Bypass-codes are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
 - Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
 - Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
 - Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
 - ☆25Updated 2 years ago
 - MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
 - 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
 - A collection of PoCs for different injection techniques on Windows!☆47Updated 2 years ago
 - RegStrike is a .reg payload generator☆58Updated 2 years ago
 - Polymorphic code obfuscator for use in Red Team operations☆31Updated 3 years ago
 - Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated last month
 - Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
 - ☆28Updated 2 years ago
 - Modular framework to exploit UPS devices☆66Updated 2 years ago
 - Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
 - AMSI Bypass for powershell☆29Updated 3 years ago
 - ☆84Updated 3 years ago
 - TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆38Updated 4 months ago
 - ☆19Updated 4 years ago
 - CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
 - With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
 - Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
 - Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
 - CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
 - MacroExploit use in excel sheet☆20Updated 2 years ago
 - PoC-Malware-TTPs☆49Updated 2 years ago
 - Hive v5 file decryption algorithm☆34Updated 2 years ago
 - ☆16Updated 5 years ago
 - Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
 - Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated last year