This map lists the essential techniques to bypass anti-virus and EDR
☆15Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for BypassAV
Users that are interested in BypassAV are comparing it to the libraries listed below
Sorting:
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆24Feb 7, 2025Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- ☆17Oct 21, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Fuzz every path with goky☆15Jan 4, 2024Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Feb 6, 2024Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- AV/EDR killer using BYOVD technique☆44Sep 27, 2024Updated last year
- ☆65Jun 5, 2021Updated 4 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- Single Repository to keep policy and simmilar documentation☆35Feb 16, 2025Updated last year
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- ☆223Mar 10, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- Config files for my GitHub profile.☆10Dec 16, 2025Updated 2 months ago
- ☆10Oct 9, 2024Updated last year
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆36May 4, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- ☆38Apr 7, 2023Updated 2 years ago