At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypass signature-based AV. The tool I used back then is gone, so I wrote this.
☆36Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for rustdsplit
Users that are interested in rustdsplit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 3 months ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Oct 3, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Jul 14, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Aug 26, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 9 months ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Source for tasks I have used with Covenant☆120Mar 21, 2021Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆241Aug 12, 2020Updated 5 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Python script to decrypt files encrypted using Cordova in Android app☆15Aug 19, 2018Updated 7 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Learn from Casey Smith@subTee☆30Apr 17, 2021Updated 4 years ago
- ☆22Apr 12, 2023Updated 3 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆38Jan 18, 2022Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago