juanbelin / Windows-AV-EvasionView external linksLinks
The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypass | Windows AV evasion
☆47Nov 4, 2025Updated 3 months ago
Alternatives and similar repositories for Windows-AV-Evasion
Users that are interested in Windows-AV-Evasion are comparing it to the libraries listed below
Sorting:
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- A PHP application that monitors websites for changes and delivers them as a unified diff via RSS☆11Aug 18, 2016Updated 9 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- Niri deb package☆17Jun 22, 2025Updated 7 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆14Nov 9, 2025Updated 3 months ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Simple Python 3 HTTP server for logging all GET and POST requests☆10Jun 16, 2020Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- ☆20Aug 6, 2025Updated 6 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Keyboard‑driven terminal app to view and manage users and groups. Browse accounts, see memberships, search, and make common changes: rena…☆23Nov 11, 2025Updated 3 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- A music player for your terminal☆15Aug 4, 2025Updated 6 months ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- CLI tool to view the status of traefik routers and services☆18Sep 4, 2025Updated 5 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Exploring fundamentals of the Web including HTML, CSS and JavaScript☆14Jul 31, 2021Updated 4 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 7 years ago
- A secure offline desktop application for generating and managing TOTP 2FA codes. Features encrypted vault storage, modern cryptography (A…☆28Jan 28, 2026Updated 2 weeks ago