Launch a Windows EXE file with this EXE file (application filter evasion)
☆15Mar 10, 2017Updated 9 years ago
Alternatives and similar repositories for ProxyExe
Users that are interested in ProxyExe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A JavaScript-based DDoS attack☆12Jul 17, 2025Updated 8 months ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Jul 28, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Load PE via XML Attribute☆31Feb 1, 2020Updated 6 years ago
- InstaNinja is your all-in-one Instagram tool designed to manage multiple accounts seamlessly. With a user-friendly GUI, InstaNinja allows…☆10Dec 30, 2024Updated last year
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- PowerShell module for Invoking DSC from json☆17Dec 28, 2017Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆19May 22, 2019Updated 6 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆24Apr 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- Heavily customized PowerShell profile.☆19Feb 21, 2021Updated 5 years ago
- An interactive TUI for exploring installed modules.☆23May 25, 2025Updated 10 months ago
- This Python-based DDoS tool for Termux enables stress testing with TCP, UDP, HTTP, and HTTPS flood attacks, featuring domain resolution, …☆18Nov 10, 2024Updated last year
- API for querying big data of broken personal data☆11May 27, 2019Updated 6 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆38Mar 11, 2026Updated 3 weeks ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆26Mar 14, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- DDos-Attack Is A Python script online Attack☆13Sep 22, 2021Updated 4 years ago
- Cross-platform automated system configuration 🛠☆24Mar 15, 2026Updated 3 weeks ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆14Nov 20, 2023Updated 2 years ago