At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypass signature-based AV. The tool I used back then is gone, so I wrote this.
☆36Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for rustdsplit
Users that are interested in rustdsplit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Oct 3, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Aug 26, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆243Aug 12, 2020Updated 5 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Python script to decrypt files encrypted using Cordova in Android app☆15Aug 19, 2018Updated 7 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Learn from Casey Smith@subTee☆29Apr 17, 2021Updated 4 years ago
- ☆22Apr 12, 2023Updated 2 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 5 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- learning case to prepare OSWE☆36Nov 4, 2019Updated 6 years ago