EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads
☆29Apr 27, 2020Updated 6 years ago
Alternatives and similar repositories for exxx_evasion
Users that are interested in exxx_evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Sep 26, 2023Updated 2 years ago
- 🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.☆45Sep 20, 2025Updated 7 months ago
- A builder for BatchStealer☆17Aug 11, 2022Updated 3 years ago
- Управление компьютером через телеграмм бота☆35Jul 1, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Mar 15, 2024Updated 2 years ago
- Hide the TCP Connection☆22Mar 24, 2023Updated 3 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Open-source windows ransomware created for educational purposes☆21Jan 24, 2021Updated 5 years ago
- cross-platform C2 framework in python 2☆37May 19, 2022Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Jun 17, 2020Updated 5 years ago
- LoVerst is a backdoor generator and backdoor generating tools.☆78Oct 9, 2022Updated 3 years ago
- Reverse engineering & visual documentation☆26Sep 24, 2024Updated last year
- RIG Exploit Kit (front end)☆31Feb 25, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 10 months ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 5 months ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆39Jan 15, 2024Updated 2 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.☆102Dec 17, 2017Updated 8 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Suna - Open Source Generalist AI Agent☆12Apr 29, 2025Updated last year
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago