n0a / meterpreter-av-bypassLinks
Bypass Windows Defender with py2exe from memory.
β36Updated 3 years ago
Alternatives and similar repositories for meterpreter-av-bypass
Users that are interested in meterpreter-av-bypass are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender All Versionβ31Updated 4 years ago
- π Reverse shell written on python3β14Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.β42Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatibleβ77Updated 5 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exeβ¦β15Updated 4 years ago
- AMSI Bypass for powershellβ29Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.β49Updated 4 years ago
- Reverse shell macro using Word VBAβ16Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β40Updated 4 years ago
- cross-platform C2 framework in python 2β39Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β33Updated 6 years ago
- Antiscan.me automatization scriptβ30Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ20Updated 4 years ago
- Passwordless RDP Session Hijackingβ69Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444β13Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β25Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]β33Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β59Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ66Updated 3 years ago
- Red Team C2 and Post Exploitation codeβ36Updated 3 months ago
- PickleC2 is a post-exploitation and lateral movements frameworkβ94Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β16Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Softwareβ68Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3β22Updated 5 years ago
- β37Updated 3 years ago
- A simple injector that uses LoadLibraryAβ18Updated 5 years ago
- Polymorphic code obfuscator for use in Red Team operationsβ30Updated 3 years ago
- Penetration Test / Read Team - C# tools repositoryβ57Updated 3 years ago