AvBuster The stress Tester for your Anti Malware solutions
☆41Feb 12, 2021Updated 5 years ago
Alternatives and similar repositories for AvBuster
Users that are interested in AvBuster are comparing it to the libraries listed below
Sorting:
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Offensive go lang series☆35May 2, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆186Feb 12, 2023Updated 3 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Dec 15, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security☆14Nov 26, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Creating a Bind Shell in C☆18Aug 21, 2023Updated 2 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Web of trust grapher☆40Updated this week
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago