n0a / meterpreter-av-bypass
Bypass Windows Defender with py2exe from memory.
β36Updated 3 years ago
Alternatives and similar repositories for meterpreter-av-bypass:
Users that are interested in meterpreter-av-bypass are comparing it to the libraries listed below
- cross-platform C2 framework in python 2β41Updated 2 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- π Reverse shell written on python3β14Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- Making Shellcode fully undetectable using uuidβ23Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 2 years ago
- AMSI Bypass for powershellβ30Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3β21Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β32Updated 5 years ago
- Passwordless RDP Session Hijackingβ66Updated 3 years ago
- A PowerShell script anti-virus evasion toolβ17Updated 4 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.β40Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.β43Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerabilityβ11Updated 3 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β24Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ64Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malβ¦β16Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ20Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllersβ18Updated 2 years ago
- A simple injector that uses LoadLibraryAβ17Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuzβ¦β34Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444β12Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β19Updated last year
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)β17Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 5 years ago
- β17Updated 4 years ago
- LSTAR - CobaltStrike Translated to ENβ15Updated last year
- Socks Proxy Server Plugin for Invoke-SocksProxyβ17Updated last month