ferreiraklet / wolfy
Wolfy AV Bypasser
☆28Updated 2 years ago
Alternatives and similar repositories for wolfy:
Users that are interested in wolfy are comparing it to the libraries listed below
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆33Updated 9 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 3 months ago
- Dump Windows SAM hashes☆41Updated last year
- Phishing Framework for OTP codes☆18Updated 2 weeks ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Nuclei template and information about the POC for CVE-2024-25600☆28Updated last year
- CVE-2023-34960 Chamilo PoC☆35Updated last year
- Winsocket for Cobalt Strike.☆97Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆41Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- Authentication Bypass in GoAnywhere MFT☆61Updated last year
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆25Updated 11 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆36Updated 2 years ago
- List of some AD tools I frequently use☆46Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 9 months ago
- ☆38Updated last month
- CVE-2023-20198 Exploit PoC☆44Updated last year
- Simple Shellcode Loader tool☆25Updated last year
- PAN-OS auth bypass + RCE☆44Updated 3 months ago
- .bin file to shellcode convertor☆33Updated 8 months ago
- ☆79Updated last year
- Exploit for the CVE-2024-5806☆43Updated 8 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆42Updated 2 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆54Updated 3 months ago
- ☆48Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated last year