Tools that trigger False Positive AV alerts
☆56Dec 24, 2024Updated last year
Alternatives and similar repositories for FalsePositives
Users that are interested in FalsePositives are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- It's pointy and it hurts!☆126Oct 18, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Sep 8, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 9 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆141Dec 8, 2025Updated 4 months ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- ☆17Apr 20, 2022Updated 4 years ago
- Steal users password with a fake sudo function.☆44Feb 29, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ☆17Jun 13, 2022Updated 3 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 3 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆118Apr 22, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆126Feb 13, 2023Updated 3 years ago
- Red Team Collaboration Infrastructure☆97Apr 24, 2025Updated last year
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆96Jan 2, 2026Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Script to install pentest tools on Alpine Linux☆10Jul 3, 2015Updated 10 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆236Mar 23, 2023Updated 3 years ago