oddcod3 / Phantom-Evasion
Python antivirus evasion tool
☆1,404Updated last year
Alternatives and similar repositories for Phantom-Evasion:
Users that are interested in Phantom-Evasion are comparing it to the libraries listed below
- AntiVirus Evasion Tool☆1,681Updated last year
- Undetectable Windows Payload Generation☆1,581Updated 2 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆974Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,249Updated 3 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,101Updated 2 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,383Updated 4 years ago
- venom - C2 shellcode generator/compiler/handler☆1,833Updated last year
- Python Remote Administration Tool (RAT) to gain meterpreter session☆604Updated 4 months ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,174Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆1,101Updated 2 years ago
- Antivirus evasion project☆1,091Updated 2 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,399Updated 6 years ago
- Python / C# Unmanaged PowerShell based RAT☆776Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,105Updated 7 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,098Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,798Updated last year
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆722Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,715Updated last month
- The Shadow Attack Framework☆1,099Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,262Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,234Updated last year
- C2 Powershell Command & Control Framework with BuiltIn Commands☆488Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,065Updated last year
- Red Team Tool Kit☆1,118Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,698Updated 5 months ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,076Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,348Updated 4 years ago
- This is the list of all rootkits found so far on github and other sites.☆1,302Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,493Updated 5 months ago