Execute shellcode and evade AV detection with python.
☆15Oct 8, 2015Updated 10 years ago
Alternatives and similar repositories for Python-AV-Evasion
Users that are interested in Python-AV-Evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆16Feb 6, 2015Updated 11 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆98Sep 26, 2019Updated 6 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- ☆50Feb 5, 2014Updated 12 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 9 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Nov 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Feb 16, 2016Updated 10 years ago
- Download and View Skype History Without Skype☆55May 18, 2018Updated 8 years ago
- cve-2018-8453 exp☆120Dec 13, 2019Updated 6 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 11 years ago
- Go package to check if an IP address is a bogon (internal) IP address☆10Apr 18, 2026Updated last month
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 15 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 9 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆55Dec 30, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Shell and Pen-testing Tool☆17May 14, 2025Updated last year
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago