This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some customization.
☆75Mar 31, 2026Updated 3 weeks ago
Alternatives and similar repositories for defender_bypass_with_sliver
Users that are interested in defender_bypass_with_sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- Scripts which can be used in helpdesk to automate job☆14Nov 23, 2023Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 9 months ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- ☆21Jul 1, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 7 months ago
- ☆23Sep 6, 2025Updated 7 months ago
- Working reverse-engineered Claude Code CLI rebuilt from source analysis to reproduce the original terminal workflow☆103Apr 18, 2026Updated last week
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆37Dec 18, 2025Updated 4 months ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- P2P File Transfer is a prototype of peer-to-peer file sharing system implemented in Go. It heps in large transfers between peers by divi…☆16Aug 5, 2024Updated last year
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆27Mar 5, 2026Updated last month
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 10 months ago
- ☆26Dec 19, 2024Updated last year
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Adds macros for vim mode plus☆12Dec 16, 2019Updated 6 years ago
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated last month
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 10 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 6 months ago
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- Unofficial micro-architecture optimized hardened_malloc package☆13Apr 22, 2026Updated last week
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 7 years ago
- A Python-based tool designed to capture IP addresses and NTLM authentication hashes from remote Windows clients using Telegram (lack of b…☆28Mar 31, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 🎨 Meet Wordmark: Your Logo Maker with Google Fonts. No-fuss, smart logo creation. 🚀☆124May 9, 2025Updated 11 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- Solves Mazes taking an image input, along with the starting and ending points. There are two Algorithms here which solve mazes. One of th…☆18Nov 21, 2023Updated 2 years ago
- A tool to keep a changelog without conflicts☆20Jul 19, 2024Updated last year
- ☆13Mar 7, 2025Updated last year
- ☆27Mar 6, 2025Updated last year