Antivirus Evasion Tool for .NET/Native (x64) Executables
☆19Jul 7, 2022Updated 3 years ago
Alternatives and similar repositories for Jlaive
Users that are interested in Jlaive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 11 months ago
- A malicous Golang Package☆15Apr 21, 2025Updated 11 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 11 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Apr 21, 2025Updated 11 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- GolangStyle, best looking go library.☆13Apr 21, 2025Updated 11 months ago
- ROBLOX Botting Utility☆12Jun 25, 2022Updated 3 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 11 months ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- a gui for browsing vx-underground☆14Oct 31, 2024Updated last year
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆12Oct 10, 2024Updated last year
- ☆11May 17, 2020Updated 5 years ago
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 11 months ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated last month
- ☆12Apr 5, 2025Updated 11 months ago
- Prevent Windows idle detection with a small C# system tray application☆10Apr 27, 2017Updated 8 years ago
- A CLI to interact with iOS's keychain on a jailbroken device to dump/edit/delete a keychain item.☆15Mar 20, 2019Updated 7 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Apr 21, 2025Updated 11 months ago
- Homebridge plugin for Mitsubishi Heavy Industries AirCon WiFi Controller (MH-AC-WIFI-1)☆10Nov 7, 2020Updated 5 years ago
- Lua Authentication Service☆24Aug 6, 2023Updated 2 years ago
- Improve keychain_dumper by adding the functionality to fetch certificates and keys stored in iOS keychain☆16Jun 11, 2018Updated 7 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Apr 21, 2025Updated 11 months ago
- A tool for scanning for nearby devices running the Australian Government CovidSafe app☆16May 2, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- A simple iOS web browser (Swift 5 + WebKit)☆12May 23, 2019Updated 6 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆51May 22, 2025Updated 10 months ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago