A guide to learning antivirus evasion
☆65Mar 28, 2025Updated last year
Alternatives and similar repositories for DefenderBypass
Users that are interested in DefenderBypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- ☆57Jul 8, 2025Updated 10 months ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆127Mar 30, 2026Updated last month
- Utilities for obfuscating shellcode☆103Mar 24, 2026Updated last month
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 5 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 7 months ago
- ☆11Oct 18, 2023Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Generate an Alphabetical Polymorphic Shellcode☆140Aug 19, 2025Updated 8 months ago
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 11 months ago
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- ☆44May 4, 2025Updated last year
- 带后门,自测☆25Jun 4, 2025Updated 11 months ago
- kernel-mode DLL Injector☆138Apr 25, 2026Updated 2 weeks ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- Remote printing by Windows print spooler API forwarding.☆15Aug 3, 2015Updated 10 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- ☆23Jun 9, 2024Updated last year
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 4 years ago
- RACF Database Parser☆12Apr 4, 2024Updated 2 years ago
- ☆59Nov 13, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 8 years ago
- ⚡ Dynamically generated your Root-me.org stats for your github readmes☆22Jan 26, 2025Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆362Mar 17, 2026Updated last month
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 9 months ago
- ☆57Feb 28, 2026Updated 2 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆131Dec 2, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- A FastAPI backend using yt-dlp to download and stream videos from YouTube, TikTok, Facebook, Instagram, Twitter, and more. Supports resol…☆17Aug 3, 2025Updated 9 months ago