HernanRodriguez1 / Bypass-AMSIView external linksLinks
☆48Apr 15, 2022Updated 3 years ago
Alternatives and similar repositories for Bypass-AMSI
Users that are interested in Bypass-AMSI are comparing it to the libraries listed below
Sorting:
- ☆12Apr 17, 2022Updated 3 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆98Apr 15, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 4 months ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆256Mar 7, 2022Updated 3 years ago
- ☆14Mar 16, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated last month
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- ☆13Dec 3, 2022Updated 3 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆27Mar 3, 2022Updated 3 years ago
- Malware development for red teaming workshop☆225Nov 15, 2021Updated 4 years ago
- ☆413Dec 14, 2023Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 2 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 10 months ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Sample Flutter application for Android☆10Jun 8, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago