CyberSecurityUP / AV-Bypass-codes
Python, C++ and Go
☆23Updated 2 years ago
Alternatives and similar repositories for AV-Bypass-codes:
Users that are interested in AV-Bypass-codes are comparing it to the libraries listed below
- Classic Web shell upload techniques & Web RCE techniques☆29Updated 5 months ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆33Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆54Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆25Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- ☆38Updated 2 years ago
- ☆22Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆22Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆15Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- ☆19Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago