Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products
☆370Sep 17, 2025Updated 5 months ago
Alternatives and similar repositories for pycrypt
Users that are interested in pycrypt are comparing it to the libraries listed below
Sorting:
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Nov 28, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Sep 17, 2025Updated 5 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Feb 5, 2024Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Sep 17, 2025Updated 5 months ago
- An Advanced Tool to Crack Any Password Protected ZIP File With different Techniques. A very Beginner Friendly Script For Newbies.☆111Sep 17, 2025Updated 5 months ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆284Aug 5, 2022Updated 3 years ago
- ☆336May 29, 2023Updated 2 years ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆320Feb 20, 2026Updated last week
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆65Dec 11, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆195Aug 16, 2023Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Oct 21, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Script for generating revshells☆478Sep 10, 2024Updated last year
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆95Aug 4, 2023Updated 2 years ago
- Msmap is a Memory WebShell Generator.☆584Apr 22, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,230Aug 18, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Updated this week
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆423Sep 17, 2025Updated 5 months ago
- GUI based tool to track location and more info of mobile numbers☆82Nov 14, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,421Jan 19, 2025Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Antivirus evasion project☆1,155Jan 19, 2025Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Nov 5, 2024Updated last year