EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads
☆29Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for exxx_evasion
Users that are interested in exxx_evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Apr 10, 2022Updated 3 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Sep 26, 2023Updated 2 years ago
- A builder for BatchStealer☆17Aug 11, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆80Mar 15, 2024Updated 2 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated last year
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- Hide the TCP Connection☆22Mar 24, 2023Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Open-source windows ransomware created for educational purposes☆22Jan 24, 2021Updated 5 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- FUD Linux Remote Access Trojan☆18Nov 18, 2022Updated 3 years ago
- cross-platform C2 framework in python 2☆38May 19, 2022Updated 3 years ago
- documentations, slides decks...☆22Sep 24, 2024Updated last year
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Jun 17, 2020Updated 5 years ago
- LoVerst is a backdoor generator and backdoor generating tools.☆78Oct 9, 2022Updated 3 years ago
- Reverse engineering & visual documentation☆26Sep 24, 2024Updated last year
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 9 months ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Jan 15, 2024Updated 2 years ago
- Steganograpy in Python | Hide files or data in Image Files☆173Oct 28, 2021Updated 4 years ago
- Take webcam snaps by sending malicious link☆13Jun 9, 2020Updated 5 years ago