The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypass | Windows AV evasion
☆47Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for Windows-AV-Evasion
Users that are interested in Windows-AV-Evasion are comparing it to the libraries listed below
Sorting:
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- A PHP application that monitors websites for changes and delivers them as a unified diff via RSS☆11Aug 18, 2016Updated 9 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Keyboard‑driven terminal app to view and manage users and groups. Browse accounts, see memberships, search, and make common changes: rena…☆24Nov 11, 2025Updated 3 months ago
- ☆20Aug 6, 2025Updated 7 months ago
- A simple and easy to use REST API client that runs in your terminal (TUI). Open-source alternative to Postman.☆32Jan 31, 2026Updated last month
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- A secure offline desktop application for generating and managing TOTP 2FA codes. Features encrypted vault storage, modern cryptography (A…☆28Jan 28, 2026Updated last month
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- ☆14Nov 9, 2025Updated 4 months ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated last month
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Hermes — an ephemeral, Docker-powered OSINT framework for testing, tinkering, and secure investigative automation.☆32Jan 18, 2026Updated last month
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆43Mar 3, 2026Updated last week
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago