AvBuster The stress Tester for your Anti Malware solutions
☆41Feb 12, 2021Updated 5 years ago
Alternatives and similar repositories for AvBuster
Users that are interested in AvBuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 7 years ago
- Offensive go lang series☆34May 2, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Awesome Pentest Reports☆21Jun 16, 2023Updated 2 years ago
- Web of trust grapher☆40Feb 25, 2026Updated 2 months ago
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20Apr 8, 2026Updated 3 weeks ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆14Sep 27, 2023Updated 2 years ago
- Sample list of penetration test reports☆18Dec 12, 2016Updated 9 years ago
- Cervantes plataform docker repository☆16Aug 6, 2025Updated 8 months ago
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆567Aug 17, 2020Updated 5 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago