This map lists the essential techniques to bypass anti-virus and EDR
☆15Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for BypassAV
Users that are interested in BypassAV are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Oct 21, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AV/EDR killer using BYOVD technique☆44Sep 27, 2024Updated last year
- ☆24Feb 7, 2025Updated last year
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE☆47Oct 23, 2021Updated 4 years ago
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- A blog where I write stuffs in order to understand them better.☆12Apr 25, 2025Updated 11 months ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Fuzz every path with goky☆15Jan 4, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆106Sep 12, 2024Updated last year
- PowerShell Reverse Shell☆80May 7, 2023Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆204Dec 27, 2023Updated 2 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 8 months ago
- ☆21Aug 26, 2021Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- ☆223Mar 10, 2024Updated 2 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- Red Teaming tools and techniques☆56Feb 18, 2023Updated 3 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago