AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI
☆323Feb 20, 2026Updated last month
Alternatives and similar repositories for OSRipper
Users that are interested in OSRipper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆531Dec 18, 2024Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆371Sep 17, 2025Updated 7 months ago
- Simple obfuscation tool☆545Apr 22, 2024Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Apr 16, 2022Updated 4 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆352Apr 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python AV Evasion Tools☆517Oct 14, 2025Updated 6 months ago
- Antivirus evasion project☆1,158Jan 19, 2025Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆115Sep 17, 2025Updated 7 months ago
- A PowerShell script anti-virus evasion tool☆1,182Mar 19, 2023Updated 3 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆44Sep 19, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆269Oct 23, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆606Dec 2, 2023Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆921Dec 9, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆326Nov 2, 2024Updated last year
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆174Dec 8, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆173Dec 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,129Jun 10, 2024Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Jul 7, 2022Updated 3 years ago
- Performing Indirect Clean Syscalls☆606Apr 19, 2023Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆518Feb 1, 2024Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆176Jul 22, 2023Updated 2 years ago
- ☆48Apr 15, 2022Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆622Sep 26, 2023Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆132Feb 24, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A BOF to automate common persistence tasks for red teamers☆295Mar 7, 2023Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆768Dec 2, 2024Updated last year
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,001Jan 19, 2024Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆293Jul 27, 2021Updated 4 years ago
- ☆206Feb 24, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago