Collection of antivirus bypass techniques
☆13Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for av_bypass
Users that are interested in av_bypass are comparing it to the libraries listed below
Sorting:
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Pwnagotchi settings, config files and plugins☆29Jan 10, 2025Updated last year
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- Bluebugger☆30Jun 19, 2025Updated 8 months ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- scrap email from instagram user followers☆12Jul 21, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- ☆35Mar 22, 2019Updated 6 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆12Jun 15, 2025Updated 8 months ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- subTee gists code backups☆37Dec 19, 2017Updated 8 years ago
- Finding secrets in various (non-text) popular files.☆52Oct 21, 2025Updated 4 months ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆22Mar 25, 2025Updated 11 months ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago