Raffy27 / AntiscanLinks
Antiscan.me automatization script
☆30Updated last year
Alternatives and similar repositories for Antiscan
Users that are interested in Antiscan are comparing it to the libraries listed below
Sorting:
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆58Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆14Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆35Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Phish password protected Excel-Files☆105Updated last year
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆66Updated 5 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆93Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago