List of real-world threats against endpoint protection software
☆217Feb 1, 2026Updated 3 months ago
Alternatives and similar repositories for avpwn
Users that are interested in avpwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Aug 13, 2018Updated 7 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Feb 24, 2019Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- bdldr is an unofficial engine loader for Bitdefender ® for Linux☆45Mar 12, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆230May 10, 2018Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆748Nov 1, 2024Updated last year
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated last month
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 9 years ago
- FLARE Kernel Shellcode Loader☆177May 3, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆67Dec 19, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- PoC☆212Jan 13, 2025Updated last year
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,164Nov 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- a tool to make it easy and fast to test various forms of injection☆172May 2, 2019Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆407Jun 6, 2020Updated 5 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆30Jul 1, 2013Updated 12 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151May 29, 2020Updated 5 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- specific fuzzers based on AFL and fuzzing results☆42Oct 22, 2016Updated 9 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago