Lists of AMSI triggers (VBA, JScript / VBScript)
☆33Jun 28, 2019Updated 6 years ago
Alternatives and similar repositories for AMSI-Bypass
Users that are interested in AMSI-Bypass are comparing it to the libraries listed below
Sorting:
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- ☆11Dec 18, 2018Updated 7 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- ☆14Jul 9, 2024Updated last year
- ☆58Aug 31, 2018Updated 7 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Use ICMP requests to check the alive subnet.☆23Jul 26, 2021Updated 4 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last month
- ☆16Nov 23, 2021Updated 4 years ago
- 分支出了些问题,无法合并到main,迁移至https://github.com/hktalent/scan4all☆17Dec 18, 2023Updated 2 years ago
- Simple tool to perform HTML Smuggling.☆67Aug 17, 2021Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Tool for playing with Windows Access Token manipulation.☆82Nov 28, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago