Python Obfuscator to generate One-Liners and FUD Payloads.
☆163Jul 11, 2021Updated 4 years ago
Alternatives and similar repositories for onelinepy
Users that are interested in onelinepy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆224Jun 13, 2021Updated 4 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆126Aug 28, 2021Updated 4 years ago
- Python AV Evasion Tools☆518Oct 14, 2025Updated 5 months ago
- PowerShell Script Obfuscator☆598Nov 2, 2023Updated 2 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆212Nov 21, 2021Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆351Oct 22, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- Simple & Powerful PowerShell Script Obfuscator☆592May 13, 2025Updated 10 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,501Dec 21, 2023Updated 2 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆279Apr 6, 2021Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆210Oct 23, 2024Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- c++ fully undetected shellcode launcher ;)☆979Jun 11, 2021Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆161Dec 19, 2021Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆917Dec 9, 2023Updated 2 years ago
- It's a simple tool for test vulnerability shellshock☆119Mar 18, 2021Updated 5 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago