n0a / meterpreter-av-bypass
Bypass Windows Defender with py2exe from memory.
☆36Updated 3 years ago
Alternatives and similar repositories for meterpreter-av-bypass
Users that are interested in meterpreter-av-bypass are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender All Version☆31Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Antiscan.me automatization script☆27Updated 11 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- ☆17Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆17Updated 5 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Reverse shell macro using Word VBA☆14Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- A PowerShell script anti-virus evasion tool☆17Updated 4 years ago
- ☆36Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- Download and loader .NET payload☆36Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago