Python, C++ and Go
☆22Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for AV-Bypass-codes
Users that are interested in AV-Bypass-codes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆15Dec 28, 2023Updated 2 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆13Dec 12, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆16Jun 3, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Jun 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆35Oct 18, 2022Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- A windows kernel-mode rootkit with remote control☆11Sep 17, 2022Updated 3 years ago
- An HTTP requests flooder made in Python☆21Aug 21, 2020Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆21Feb 16, 2021Updated 5 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Most powerfull Wifi Jammier.with fixes.