☆15Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for GoAmsiKiller
Users that are interested in GoAmsiKiller are comparing it to the libraries listed below
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- Pure Go lang cryptor and shellcode injector☆20Feb 25, 2021Updated 5 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Nov 12, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- ☆78Aug 1, 2023Updated 2 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- PoC that downloads an executable from a public SSL certificate☆136Jul 27, 2025Updated 7 months ago
- ☆10Oct 9, 2024Updated last year
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Aplicación para jugar quinielas de fútbol elaborada en PHP con MYSQL☆11Feb 5, 2023Updated 3 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆14Updated this week
- ☆12Sep 20, 2020Updated 5 years ago
- ☆10Mar 27, 2022Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Generador de los sitios estáticos para mostrar las estadísticas del fútbol de la comunidad desde una Google Spreadsheet.☆10Apr 16, 2021Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆46Mar 4, 2024Updated 2 years ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago