AV Bypass
☆29Jan 12, 2018Updated 8 years ago
Alternatives and similar repositories for avbypassGo
Users that are interested in avbypassGo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Web of trust grapher☆40Feb 25, 2026Updated 3 weeks ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 7 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Jul 20, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.☆168Jun 10, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Babel Scripting Framework☆43Oct 28, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago