.NET Antivirus Evasion Tool (Exe2Bat)
☆40Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Jlaive
Users that are interested in Jlaive are comparing it to the libraries listed below
Sorting:
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- ☆15May 6, 2023Updated 2 years ago
- File-Upload-XSS is a Python script that exploits the SVG XSS vulnerability in file upload services to gather information about users visi…☆18Jan 15, 2023Updated 3 years ago
- ☆20May 1, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- ☆47Feb 11, 2023Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆42Jun 27, 2022Updated 3 years ago
- ☆16Mar 26, 2024Updated last year
- ☆26Mar 10, 2022Updated 3 years ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 7 months ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- A Free PHP Interface with VB.NET based Stub and Builder BotNET☆23Jan 9, 2019Updated 7 years ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- AV/EDR killer using BYOVD technique☆44Sep 27, 2024Updated last year
- ☆37Feb 11, 2023Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- ☆38Feb 9, 2025Updated last year
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- ☆74Jun 17, 2025Updated 8 months ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- ☆11Jun 10, 2025Updated 8 months ago