0xZ0F / BitdefenderEvaderLinks
☆7Updated 5 years ago
Alternatives and similar repositories for BitdefenderEvader
Users that are interested in BitdefenderEvader are comparing it to the libraries listed below
Sorting:
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- ☆14Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- XOR crypt/decrypt using C#☆12Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- ☆10Updated 3 years ago
- ☆15Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- ☆17Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- ☆12Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- ☆24Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago