Antivirus Signature Search Toolkit
☆81Apr 30, 2023Updated 3 years ago
Alternatives and similar repositories for sf2
Users that are interested in sf2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Jan 3, 2023Updated 3 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆17Jul 6, 2021Updated 4 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆86Sep 27, 2025Updated 7 months ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Nov 24, 2019Updated 6 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ☆29May 19, 2023Updated 2 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Execute an arbitrary command within the context of another process☆20Jun 28, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Jun 6, 2023Updated 2 years ago
- Portable executable parsing and modification library☆36Jan 15, 2025Updated last year
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆18Jul 2, 2019Updated 6 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆316Nov 29, 2025Updated 5 months ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆258May 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- random code snippets, useful for getting started☆123Nov 29, 2025Updated 5 months ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆476Jul 6, 2024Updated last year
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago