AV Bypass
☆29Jan 12, 2018Updated 8 years ago
Alternatives and similar repositories for avbypassGo
Users that are interested in avbypassGo are comparing it to the libraries listed below
Sorting:
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Web of trust grapher☆40Feb 25, 2026Updated last week
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Offensive go lang series☆35May 2, 2020Updated 5 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- A command line tool for creating malicious outlook rules☆165Dec 11, 2018Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Testing/collecting some container breakouts☆94Jul 22, 2019Updated 6 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago