n0a / meterpreter-av-bypassView external linksLinks
Bypass Windows Defender with py2exe from memory.
☆40Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for meterpreter-av-bypass
Users that are interested in meterpreter-av-bypass are comparing it to the libraries listed below
Sorting:
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Loader that loads shellcode from UUID's☆23Aug 21, 2025Updated 5 months ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆203Aug 1, 2025Updated 6 months ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Linux/macOS random/vendor MAC-address changer.☆16Mar 20, 2022Updated 3 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆27Mar 6, 2021Updated 4 years ago
- ☆12Feb 20, 2022Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Mar 12, 2023Updated 2 years ago
- ☆38Mar 4, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year