π΅ Ethereum and BNB (BSC) Mev bot - Arbitrage
β365Mar 4, 2026Updated 2 months ago
Alternatives and similar repositories for ethereum-bnb-mev-bot
Users that are interested in ethereum-bnb-mev-bot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Bring Your Own Land Toolkit that Doubles as a WMI Providerβ289Oct 31, 2018Updated 7 years ago
- β230May 10, 2018Updated 7 years ago
- β67Dec 19, 2018Updated 7 years ago
- Tool to create hidden registry keys.β488Oct 23, 2019Updated 6 years ago
- β184Feb 21, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed overβ¦β383Aug 17, 2018Updated 7 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.β60Feb 11, 2025Updated last year
- β350Mar 19, 2021Updated 5 years ago
- A C# implementation of PrivExchange by @_dirkjan.β155Mar 15, 2019Updated 7 years ago
- A PowerShell example of the Windows zero day priv escβ328Sep 12, 2018Updated 7 years ago
- β110May 14, 2018Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.β371Feb 23, 2024Updated 2 years ago
- A tool to elevate privilege with Windows Tokensβ1,066Oct 6, 2023Updated 2 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)β325Mar 26, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Powershell script for enumerating vulnerable DCOM Applicationsβ265Nov 30, 2018Updated 7 years ago
- β54Aug 13, 2018Updated 7 years ago
- Lateral Movement technique using DCOM and HTAβ235Oct 18, 2022Updated 3 years ago
- Forward local or remote tcp ports through SMB pipes.β297Mar 7, 2021Updated 5 years ago
- Remote Recon and Collectionβ460Nov 23, 2017Updated 8 years ago
- β94Nov 16, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approaβ¦β288Aug 7, 2020Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/β177Jul 21, 2020Updated 5 years ago
- Process reimaging proof of concept codeβ97Jun 21, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASSβ1,658Oct 11, 2018Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autorunsβ67Jul 18, 2017Updated 8 years ago
- Collection of PowerShell scriptsβ452Dec 18, 2017Updated 8 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.β330Jul 7, 2023Updated 2 years ago
- Aggressor scripts for phases of a pen test or red team assessmentβ184Aug 13, 2024Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β1,615Dec 10, 2018Updated 7 years ago
- Stealthy backdoor for Windows operating systemsβ284Feb 13, 2020Updated 6 years ago
- CobaltStrike External C2 for Websocketsβ196Jul 16, 2019Updated 6 years ago
- Process Injectionβ767Oct 24, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This toolβ¦β1,124Feb 10, 2021Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.β110Jan 20, 2021Updated 5 years ago
- Run shellcode from resourceβ259Dec 13, 2020Updated 5 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.β10Feb 26, 2026Updated 2 months ago
- Cobalt Strike cna script for randomized argument spoofingβ51Apr 4, 2019Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using eβ¦β58Apr 13, 2024Updated 2 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentestingβ41Feb 18, 2019Updated 7 years ago