cyb3rfortr3ss / ByDeF
Generate an undetectable PE ( .exe ), which bypasses windows defender / AV
☆49Updated this week
Alternatives and similar repositories for ByDeF:
Users that are interested in ByDeF are comparing it to the libraries listed below
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆33Updated last month
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆126Updated 2 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 6 months ago
- ☆47Updated 2 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- This is an AD pentest tools collection☆57Updated 8 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated 8 months ago
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆71Updated last month
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 2 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆75Updated 5 months ago
- GeoServer Remote Code Execution☆78Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆61Updated 10 months ago
- A fast subdomain takeover tool☆74Updated last year
- PowerShell Obfuscator☆121Updated 9 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 5 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated 8 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆30Updated 8 months ago
- ☆37Updated 7 months ago
- Online-Crawler-Wayback-Machine☆27Updated 5 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 2 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- ☆48Updated 9 months ago