Xyan1d3 / SharpEvaderView external linksLinks
This is a python script which automatically generates metepreter tcp or https shellcode encodes it and slaps some Behavioural detection in a c# Project for you to build and run
☆14Feb 13, 2023Updated 3 years ago
Alternatives and similar repositories for SharpEvader
Users that are interested in SharpEvader are comparing it to the libraries listed below
Sorting:
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Facebook Auto Reacts & Followers Adder☆11Dec 25, 2021Updated 4 years ago
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- 5 Projects based on Unsupervised learning☆11Feb 10, 2021Updated 5 years ago
- Releases materials for ConnectyCube JS SDK platform https://connectycube.com☆10Nov 4, 2025Updated 3 months ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- MSVC C++ resource example☆11Jun 28, 2018Updated 7 years ago
- ☆20Sep 6, 2025Updated 5 months ago
- An efficient Python script to obfuscate code by renaming identifiers.☆11Jun 29, 2023Updated 2 years ago
- A Python library for efficient and flexible cycle-consistency training of transformer models via iteratie back-translation. Memory and co…☆11Jan 13, 2025Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- List of some really cool websites☆12Feb 7, 2025Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated 11 months ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆17Sep 30, 2022Updated 3 years ago
- ☆17May 19, 2012Updated 13 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Seven different DLL injection techniques in one single project.☆13May 19, 2020Updated 5 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Email Classification using Machine Learning and Natural Language Processing in Python☆14Nov 30, 2018Updated 7 years ago
- 神器獬廌-CobaltStrike综合框架☆10Oct 15, 2022Updated 3 years ago
- Turrtle WoW Mail AddOn. Automatically opens mail, mail multiple items, autocomplete recipient names, shows collected gold☆18Sep 10, 2025Updated 5 months ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆18Sep 9, 2025Updated 5 months ago
- Daily C2 threat intelligence feed☆19Updated this week
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- python reverse shell with gmail☆16Aug 9, 2024Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago