The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypass | Windows AV evasion
☆49Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for Windows-AV-Evasion
Users that are interested in Windows-AV-Evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script to perform a REST API query to get IP address geo-location information☆16Oct 21, 2018Updated 7 years ago
- Hack instagram using simple bruteforce method ✨☆12Aug 13, 2024Updated last year
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Hermes — an ephemeral, Docker-powered OSINT framework for testing, tinkering, and secure investigative automation.☆32Jan 18, 2026Updated 2 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆45Mar 23, 2026Updated last week
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Privacy-first behavioral intelligence framework for multi-platform analysis and sociodynamic research.☆39Dec 30, 2025Updated 2 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Source for "My Keyboard is Full of Ants!", a word game about squashing the ants living in your keyboard made for Ludum Dare 56.☆10Nov 2, 2024Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- 📵 A windows desktop program designed for one thing; to help you remove your data from 50+ people-search sites at the source. No cloud, n…☆36Feb 18, 2026Updated last month
- ☆13Nov 11, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- RAR-NextgenerationAI-expliot (use ai and more new techniques)☆21May 5, 2025Updated 10 months ago
- A PHP application that monitors websites for changes and delivers them as a unified diff via RSS☆11Aug 18, 2016Updated 9 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- World's Simplest Todo, Just 1 checkbox per day, no bs!☆13Nov 22, 2024Updated last year
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- How to create a native Android command-line application that loads and uses ART virtual machine☆12May 12, 2025Updated 10 months ago
- mini context toolbar in editor for Obsidian☆15Aug 4, 2023Updated 2 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- Dynamically generate system information for MOTD SSH banner☆13Aug 4, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 2 months ago
- ☆42Jan 18, 2026Updated 2 months ago
- A python program that crawls a website and tries to stress it, polluting forms with bogus data☆26Feb 20, 2026Updated last month
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- Rename multiple ebook files based on available embedded metadata (pure ruby implementation version)☆10Mar 17, 2018Updated 8 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆25Mar 5, 2026Updated 3 weeks ago
- A python program to grab Wi-Fi credentials from a windows machine.☆18Feb 28, 2025Updated last year
- A simple and easy to use REST API client that runs in your terminal (TUI). Open-source alternative to Postman.☆34Jan 31, 2026Updated last month
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CLI tool to view the status of traefik routers and services☆18Sep 4, 2025Updated 6 months ago
- ☆15Nov 9, 2025Updated 4 months ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- ☆20Aug 6, 2025Updated 7 months ago
- ☆16Feb 23, 2021Updated 5 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year