IDS/IPS malware download evasion
☆15Feb 21, 2019Updated 7 years ago
Alternatives and similar repositories for evador
Users that are interested in evador are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- AHA! Website Source☆19Mar 17, 2026Updated last week
- WIP - Revamped Alfred [2.0]☆40May 8, 2025Updated 10 months ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- Connect to WiFi for free all over the world!☆24Oct 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆182Feb 21, 2022Updated 4 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- BadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit☆36Mar 9, 2019Updated 7 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- correlate your Philips Hue lights to the bitcoin price on Bitfinex☆21Mar 16, 2017Updated 9 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆30Jul 11, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A stack-based, interpreted programming language implemented in livescript.☆10Sep 11, 2016Updated 9 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Tool for managing MySQL migrations with python☆10Aug 12, 2023Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Reverse Shell Using JavaScript & XSS☆36Jun 4, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago