gnxbr / Fully-Undetectable-TechniquesLinks
☆372Updated 3 weeks ago
Alternatives and similar repositories for Fully-Undetectable-Techniques
Users that are interested in Fully-Undetectable-Techniques are comparing it to the libraries listed below
Sorting:
- PoC exploits I wrote. They're as is and I will not offer support☆277Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆568Updated last year
- Encrypted PE Loader Generator☆546Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆314Updated 2 years ago
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆372Updated 2 years ago
- A tool for generating fake code signing certificates or signing real ones☆947Updated 2 years ago
- ☆667Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- ☆344Updated 4 years ago
- Red Team C code repo☆562Updated 9 months ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 4 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆829Updated 4 years ago
- A unique technique to execute binaries from a password protected zip☆1,033Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆846Updated 3 years ago
- A beacon generator using Cobalt Strike and a variety of tools.☆449Updated 4 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆280Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆928Updated 4 months ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆332Updated 4 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆330Updated 3 years ago
- A collection of tools to abuse chrome browser☆296Updated 4 years ago
- c++ fully undetected shellcode launcher ;)☆976Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆802Updated last year
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆321Updated 4 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆602Updated 3 years ago