This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some customization.
☆80Mar 31, 2026Updated last month
Alternatives and similar repositories for defender_bypass_with_sliver
Users that are interested in defender_bypass_with_sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A WordPress rest-enumeration script☆10Updated this week
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- Scripts which can be used in helpdesk to automate job☆14Nov 23, 2023Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 10 months ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- ☆21Jul 1, 2025Updated 10 months ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 8 months ago
- ☆24Sep 6, 2025Updated 8 months ago
- Working reverse-engineered Claude Code CLI rebuilt from source analysis to reproduce the original terminal workflow☆109Apr 18, 2026Updated last month
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆37Dec 18, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- P2P File Transfer is a prototype of peer-to-peer file sharing system implemented in Go. It heps in large transfers between peers by divi…☆16Aug 5, 2024Updated last year
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆28Mar 5, 2026Updated 2 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 11 months ago
- ☆26Dec 19, 2024Updated last year
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Adds macros for vim mode plus☆12Dec 16, 2019Updated 6 years ago
- Deception implementation through analysis of BloodHound data☆59Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 10 months ago
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 7 months ago
- Unofficial micro-architecture optimized hardened_malloc package☆13May 5, 2026Updated 2 weeks ago
- ☆31Dec 11, 2025Updated 5 months ago
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 7 years ago
- 🎨 Meet Wordmark: Your Logo Maker with Google Fonts. No-fuss, smart logo creation. 🚀☆124May 9, 2025Updated last year
- A Python-based tool designed to capture IP addresses and NTLM authentication hashes from remote Windows clients using Telegram (lack of b…☆28Mar 31, 2025Updated last year
- ☆11Aug 18, 2023Updated 2 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- Solves Mazes taking an image input, along with the starting and ending points. There are two Algorithms here which solve mazes. One of th…☆19Nov 21, 2023Updated 2 years ago