gemini-security / Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-ShellLinks
Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell
☆41Updated 2 years ago
Alternatives and similar repositories for Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell
Users that are interested in Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- .bin file to shellcode convertor☆37Updated 10 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆152Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Havoc C2 profile generator☆89Updated 7 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆87Updated 2 months ago
- Null-free shellcode for TCP reverse shell on Windows x64☆56Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- ☆166Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆136Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆65Updated last month
- C or BOF file to extract WebKit master key to decrypt user cookie☆196Updated last year
- ApexLdr is a DLL Payload Loader written in C☆110Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆152Updated last year
- ☆99Updated last year
- ☆87Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- C# havoc implant☆99Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆165Updated 2 months ago
- Windows Kernel Offensive Toolset☆122Updated 8 months ago
- ☆124Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Evasive Golang Loader☆131Updated 10 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆119Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago