s0i37 / av_bypassView external linksLinks
Collection of antivirus bypass techniques
☆12Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for av_bypass
Users that are interested in av_bypass are comparing it to the libraries listed below
Sorting:
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- karma WiFi attack implementation☆55Oct 23, 2024Updated last year
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 2 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- exfiltration/infiltration toolkit☆49Oct 31, 2024Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Pwnagotchi settings, config files and plugins☆29Jan 10, 2025Updated last year
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Sends a verify code to your email from microsoft☆12Aug 17, 2025Updated 5 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- Bluebugger☆30Jun 19, 2025Updated 7 months ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated last month
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- ☆35Mar 22, 2019Updated 6 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆12Jun 15, 2025Updated 7 months ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆18Mar 25, 2025Updated 10 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- subTee gists code backups☆37Dec 19, 2017Updated 8 years ago
- A little implant which SSH's back with a shell☆38Feb 1, 2022Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Finding secrets in various (non-text) popular files.☆51Oct 21, 2025Updated 3 months ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year