tokyoneon / ArmorView external linksLinks
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
☆277Aug 24, 2023Updated 2 years ago
Alternatives and similar repositories for Armor
Users that are interested in Armor are comparing it to the libraries listed below
Sorting:
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 4 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- ☆99May 3, 2018Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆300May 9, 2020Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,389Feb 10, 2021Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- Auto Root Exploit Tool☆534Jun 15, 2023Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- A tool for finding and analyzing private (and public) key files, including support for Android APK files.☆276Nov 7, 2022Updated 3 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- GTRS - Google Translator Reverse Shell☆625Sep 26, 2025Updated 4 months ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆142Dec 16, 2018Updated 7 years ago
- iOS/macOS/Linux Remote Administration Tool☆1,741Mar 25, 2021Updated 4 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 8 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆221Aug 4, 2018Updated 7 years ago
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,139Oct 20, 2025Updated 3 months ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year