Generate FUD Droppers that are undetectable by popular AV's
☆32Oct 21, 2023Updated 2 years ago
Alternatives and similar repositories for OP-FUD
Users that are interested in OP-FUD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Nov 28, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- A Simple Script For SSH BruteForce☆39Aug 4, 2023Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Oct 21, 2023Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆20Nov 20, 2023Updated 2 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆66Dec 11, 2023Updated 2 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆40Feb 12, 2023Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 6 months ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 8 months ago
- A small script to find the exact Geo-location of IP☆40Nov 21, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆95Aug 4, 2023Updated 2 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.