Modify machine code in binaries with alternative x64 assembly opcodes for AV evasion
☆67Apr 16, 2026Updated this week
Alternatives and similar repositories for Beatrice.py
Users that are interested in Beatrice.py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 9 months ago
- Tiny and fast port scanner (Sliver edition)☆29Feb 17, 2026Updated 2 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆43Dec 7, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- dcsync bof☆51Feb 13, 2026Updated 2 months ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 9 months ago
- Malicious powershell scripts loader designed to avoid detection.☆59Jun 16, 2023Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆57Jul 13, 2025Updated 9 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆186Oct 21, 2025Updated 5 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 9 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- ☆16May 22, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆38Oct 9, 2025Updated 6 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 10 months ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆65Jul 29, 2023Updated 2 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆19Jul 15, 2025Updated 9 months ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated last month
- Mockingjay process self injection POC☆50Aug 8, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Bof of RegPwn by MDSec☆117Mar 15, 2026Updated last month
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Ready to go Phishing Platform☆58Oct 15, 2024Updated last year
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"☆16Sep 17, 2022Updated 3 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆38Mar 11, 2026Updated last month
- Windows Session Hijacking via COM☆346Dec 13, 2025Updated 4 months ago
- Tool for WPA Enterprise hacking☆17Feb 24, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Dec 11, 2017Updated 8 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 3 months ago
- Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime☆84Mar 29, 2026Updated 3 weeks ago
- ☆18Dec 23, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago