☆13Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for RevershellTCPEncrypt_BypassAMSI
Users that are interested in RevershellTCPEncrypt_BypassAMSI are comparing it to the libraries listed below
Sorting:
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- ☆20Nov 6, 2012Updated 13 years ago
- brownie port of damn vulnerable defi☆14Feb 3, 2022Updated 4 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- Tool for playing with Windows Access Token manipulation.☆82Nov 28, 2022Updated 3 years ago
- ☆29Feb 9, 2026Updated last month
- ☆53May 18, 2024Updated last year
- Complete Firebase Web Auth Tutorial Login With Email Facebook Google and OTP☆19Aug 29, 2020Updated 5 years ago
- ☆26Jun 2, 2023Updated 2 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- ☆15May 22, 2021Updated 4 years ago
- A GUI tool for decrypting Pluralsight videos☆10Jun 17, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- Open source & free software that measures the compliance of any webpage with the #GDPR by analyzing its source code and its behaviour. #p…☆17Dec 8, 2022Updated 3 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Windows Hardening Powershell Scripts☆25Oct 3, 2025Updated 5 months ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers. It extracts and displays b…☆55Oct 10, 2025Updated 5 months ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 10 months ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆18Jan 16, 2024Updated 2 years ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- This contains scripts, tools, and other programs I show case on my youtube channel.☆22Oct 30, 2025Updated 4 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- VI-SVC model is just VITS without MAS and DurationPredictor.☆10Nov 9, 2023Updated 2 years ago