Launch a Windows EXE file with this EXE file (application filter evasion)
☆14Mar 10, 2017Updated 9 years ago
Alternatives and similar repositories for ProxyExe
Users that are interested in ProxyExe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Jun 6, 2023Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆54Dec 23, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- C# Admin Control Panel Finder For Windows☆44Sep 23, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32May 28, 2019Updated 6 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A JavaScript-based DDoS attack☆12Jul 17, 2025Updated 10 months ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆29Jul 28, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Load PE via XML Attribute☆31Feb 1, 2020Updated 6 years ago
- InstaNinja is your all-in-one Instagram tool designed to manage multiple accounts seamlessly. With a user-friendly GUI, InstaNinja allows…☆11Dec 30, 2024Updated last year
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆19May 22, 2019Updated 6 years ago
- PowerShell module for Invoking DSC from json☆17Dec 28, 2017Updated 8 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆23Apr 12, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 6 years ago
- Heavily customized PowerShell profile.☆19Feb 21, 2021Updated 5 years ago
- API for querying big data of broken personal data☆11May 27, 2019Updated 6 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆40Mar 11, 2026Updated 2 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- A cross-platform remote administration tool written in Java☆18Aug 26, 2020Updated 5 years ago
- This Python-based DDoS tool for Termux enables stress testing with TCP, UDP, HTTP, and HTTPS flood attacks, featuring domain resolution, …☆21Nov 10, 2024Updated last year
- Modular C2 server to tame your pack of wolves☆28Apr 25, 2026Updated 3 weeks ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆22Jun 9, 2025Updated 11 months ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- An interactive TUI for exploring installed modules.☆27Apr 18, 2026Updated last month
- DDos-Attack Is A Python script online Attack☆13Sep 22, 2021Updated 4 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago
- Cross-platform automated system configuration 🛠☆24Mar 15, 2026Updated 2 months ago