Ximoxkil547 / undetectableRevShellLinks
This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender
☆27Updated last year
Alternatives and similar repositories for undetectableRevShell
Users that are interested in undetectableRevShell are comparing it to the libraries listed below
Sorting:
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆78Updated 4 months ago
 - NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆169Updated last week
 - A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 7 months ago
 - Continuous password spraying tool☆194Updated last week
 - Ghosting-AMSI☆219Updated 6 months ago
 - RunPE implementation with multiple evasive techniques☆229Updated last month
 - ☆184Updated 4 months ago
 - SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆346Updated last month
 - Execute commands interactively on remote Windows machines using the WinRM protocol☆270Updated last week
 - The different ways to dump lsass☆193Updated 2 months ago
 - A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆208Updated 4 months ago
 - "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆307Updated last month
 - A PoC for Early Cascade process injection technique.☆198Updated 9 months ago
 - comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
 - PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
 - Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆218Updated last year
 - ☆210Updated last year
 - ☆24Updated last year
 - C++ Reflective Assembly Loader☆28Updated 7 months ago
 - Enhance Your Active Directory Password Spraying with User Intelligence.☆295Updated 2 months ago
 - A guide to learning antivirus evasion☆55Updated 7 months ago
 - ☆338Updated 2 weeks ago
 - Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆247Updated 6 months ago
 - Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
 - ☆77Updated 6 months ago
 - C2 Infrastructure Automation☆111Updated 4 months ago
 - A powerful, modular, lightweight and efficient command & control framework written in Nim.☆207Updated this week
 - psexecsvc - a python implementation of PSExec's native service implementation☆220Updated 8 months ago
 - Weaponizing DCOM for NTLM Authentication Coercions☆268Updated 4 months ago
 - Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆175Updated 7 months ago