AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI
☆319Feb 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for OSRipper
Users that are interested in OSRipper are comparing it to the libraries listed below
Sorting:
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆527Dec 18, 2024Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆371Sep 17, 2025Updated 5 months ago
- Python AV Evasion Tools☆518Oct 14, 2025Updated 4 months ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆352Apr 20, 2022Updated 3 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 5 months ago
- Simple obfuscation tool☆542Apr 22, 2024Updated last year
- Antivirus evasion project☆1,154Jan 19, 2025Updated last year
- A technique of hiding malicious shellcode via Shannon encoding.☆264Oct 23, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,497Dec 21, 2023Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆606Mar 19, 2022Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆913Dec 9, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,369Oct 27, 2023Updated 2 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Feb 5, 2024Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆133Feb 24, 2026Updated last week
- a tool to help operate in EDRs' blind spots☆766Dec 2, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,056Oct 14, 2025Updated 4 months ago
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆606Dec 2, 2023Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆1,171Mar 19, 2023Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆517Feb 1, 2024Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- A BOF to automate common persistence tasks for red teamers☆295Mar 7, 2023Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Jul 27, 2021Updated 4 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆528Oct 5, 2022Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- ☆266Jun 29, 2022Updated 3 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆604Apr 19, 2023Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆328Nov 2, 2024Updated last year
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆456Oct 25, 2021Updated 4 years ago
- ☆207Feb 24, 2022Updated 4 years ago