Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions
☆12Apr 24, 2017Updated 8 years ago
Alternatives and similar repositories for veil-Evasion
Users that are interested in veil-Evasion are comparing it to the libraries listed below
Sorting:
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- In-depth documentation for Gnoland developers, providing introductions, deep tutorials, and development resources.☆12Mar 12, 2024Updated last year
- Launcher for the fifa live editor☆10Updated this week
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 7 months ago
- ☆44Oct 15, 2019Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Develop for Gno using your app's native language☆10Nov 4, 2025Updated 4 months ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Protochannel is a TicTacToe game using of Ethereum State Channel to do off-chain transactions☆10Dec 29, 2022Updated 3 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Hash function for Cloudflare Workers☆14Updated this week
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- send me some eth, how bout dat?☆13Feb 17, 2019Updated 7 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- Simple tool to help bruteforce your Ethereum keystore passphrase☆10May 23, 2017Updated 8 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- 基于天眼查的批量备案域名查询脚本☆13Oct 31, 2021Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Jun 8, 2020Updated 5 years ago
- On-device Android forensics tookit☆33Feb 19, 2026Updated 2 weeks ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Inserts Google Tag Manager script in header.☆12Mar 2, 2017Updated 9 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Cloud Native high performance security and privacy SQL proxy.☆18Oct 10, 2022Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- A wrapper library around native windows sytem APIs☆10Dec 23, 2019Updated 6 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- A Python package that demontrates arbitrary code execution during the install process of a Python package.☆11Sep 28, 2014Updated 11 years ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- 🐍 Vyper language support in Atom☆11Mar 24, 2022Updated 3 years ago
- ☆12Jan 25, 2016Updated 10 years ago