AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI
☆322Feb 20, 2026Updated last month
Alternatives and similar repositories for OSRipper
Users that are interested in OSRipper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆528Dec 18, 2024Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆372Sep 17, 2025Updated 6 months ago
- Simple obfuscation tool☆546Apr 22, 2024Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python AV Evasion Tools☆519Oct 14, 2025Updated 5 months ago
- Antivirus evasion project☆1,155Jan 19, 2025Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 6 months ago
- A PowerShell script anti-virus evasion tool☆1,175Mar 19, 2023Updated 3 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆44Sep 19, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆161Dec 19, 2021Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆265Oct 23, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆607Dec 2, 2023Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,502Dec 21, 2023Updated 2 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆917Dec 9, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Nov 2, 2024Updated last year
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆173Dec 8, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆175Dec 10, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- Performing Indirect Clean Syscalls☆607Apr 19, 2023Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆520Feb 1, 2024Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 4 years ago
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆177Jul 22, 2023Updated 2 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆619Sep 26, 2023Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆132Feb 24, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A BOF to automate common persistence tasks for red teamers☆297Mar 7, 2023Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Jul 27, 2021Updated 4 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,002Jan 19, 2024Updated 2 years ago
- ☆207Feb 24, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆457Oct 25, 2021Updated 4 years ago