AvBuster The stress Tester for your Anti Malware solutions
☆41Feb 12, 2021Updated 5 years ago
Alternatives and similar repositories for AvBuster
Users that are interested in AvBuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 7 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- Web of trust grapher☆40Feb 25, 2026Updated 3 weeks ago
- Overwrite a process's recovery callback and execute with WER☆101Apr 17, 2022Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆185Feb 12, 2023Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Mar 16, 2026Updated last week
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Sample list of penetration test reports☆17Dec 12, 2016Updated 9 years ago
- Cervantes plataform docker repository☆15Aug 6, 2025Updated 7 months ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago