gemini-security / Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-ShellLinks
Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell
☆44Updated 2 years ago
Alternatives and similar repositories for Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell
Users that are interested in Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- AV bypass while you sip your Chai!☆223Updated last year
- ☆170Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆161Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆142Updated 2 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- Execute shellcode files with rundll32☆210Updated last year
- Evasive Golang Loader☆138Updated last year
- Havoc C2 profile generator☆99Updated 4 months ago
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆278Updated 8 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- .bin file to shellcode convertor☆38Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆205Updated last year
- ☆137Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- ☆100Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆150Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆175Updated 2 weeks ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆238Updated 2 years ago
- Create Anti-Copy DRM Malware☆68Updated last year
- Shaco is a linux agent for havoc☆167Updated 2 years ago
- ☆245Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ☆122Updated 7 months ago
- Basic interactive Windows kernel offensive toolkit written in C☆133Updated last month