C# AV bypass jank
☆35Feb 9, 2021Updated 5 years ago
Alternatives and similar repositories for DotNetAVBypass-Master
Users that are interested in DotNetAVBypass-Master are comparing it to the libraries listed below
Sorting:
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- ☆11Jan 25, 2023Updated 3 years ago
- A revamp of the good old NetSeal licensing system, with security !☆16Jun 15, 2018Updated 7 years ago
- A sample spyware written in VB.NET☆20Mar 11, 2017Updated 9 years ago
- Managed wrappers around the Windows API and some Native API☆35Jun 15, 2018Updated 7 years ago
- ☆46Aug 15, 2021Updated 4 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- ☆26Apr 29, 2017Updated 8 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ecshop rce getshell☆31Dec 5, 2018Updated 7 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Overwrites the whole PE Header☆20Apr 20, 2020Updated 5 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Nov 20, 2019Updated 6 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- cms识别☆13Dec 2, 2017Updated 8 years ago
- Plugin-based obfuscator☆14Jun 13, 2019Updated 6 years ago
- Example managed and unmanaged plugins for CoreHook☆14Mar 3, 2019Updated 7 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago