AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI
☆326Feb 20, 2026Updated 2 months ago
Alternatives and similar repositories for OSRipper
Users that are interested in OSRipper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆535Dec 18, 2024Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆368Sep 17, 2025Updated 7 months ago
- Simple obfuscation tool☆546Apr 22, 2024Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 4 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆350Apr 20, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python AV Evasion Tools☆518Oct 14, 2025Updated 6 months ago
- Antivirus evasion project☆1,161Jan 19, 2025Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆114Sep 17, 2025Updated 7 months ago
- A PowerShell script anti-virus evasion tool☆1,187Mar 19, 2023Updated 3 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆43Sep 19, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆272Oct 23, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆608Dec 2, 2023Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆924Dec 9, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,386Oct 27, 2023Updated 2 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆303Feb 7, 2024Updated 2 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆325Nov 2, 2024Updated last year
- Open-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter☆175Dec 8, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆174Dec 10, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆259Jul 7, 2022Updated 3 years ago
- Performing Indirect Clean Syscalls☆612May 2, 2026Updated last week
- .NET/PowerShell/VBA Offensive Security Obfuscator☆521Feb 1, 2024Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆175Jul 22, 2023Updated 2 years ago
- ☆48Apr 15, 2022Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆625Sep 26, 2023Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆132Feb 24, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A BOF to automate common persistence tasks for red teamers☆298Mar 7, 2023Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆770Dec 2, 2024Updated last year
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,000Jan 19, 2024Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆293Jul 27, 2021Updated 4 years ago
- ☆209Feb 24, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago