ASTROID v 1.2 bypass most A.V softwares
☆88Jun 18, 2017Updated 8 years ago
Alternatives and similar repositories for astroid
Users that are interested in astroid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- cobaltstrike xor64.bin补完计划☆135Oct 14, 2018Updated 7 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Jun 13, 2020Updated 5 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- simple script that helps you to Embed a Payload into an Apk easly☆20Feb 22, 2019Updated 7 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- Just pick out the code we need.☆65Nov 22, 2019Updated 6 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Jul 14, 2016Updated 9 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AntiVirus Evasion Tool☆1,748Apr 23, 2025Updated 11 months ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- Some useful scripts for CobaltStrike☆858Dec 17, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆43May 26, 2020Updated 5 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- 🚀 Dzjecter V2.0 Server checking Tool☆58May 2, 2018Updated 7 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 3 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- 前渗透信息探测工具集-子域名☆137Jan 11, 2018Updated 8 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago