0xyg3n / DarkFenderView external linksLinks
Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)
☆36Jul 31, 2020Updated 5 years ago
Alternatives and similar repositories for DarkFender
Users that are interested in DarkFender are comparing it to the libraries listed below
Sorting:
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Jun 14, 2020Updated 5 years ago
- python-shellcode加载器☆11Oct 28, 2019Updated 6 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆253Feb 5, 2021Updated 5 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Remote Access Tool for Windows.☆85Nov 14, 2022Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- CobaltStrike Extentions☆40Oct 24, 2021Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆207Oct 23, 2024Updated last year
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- exploiting pakistani cnic number to get location and gender behind it☆14Apr 1, 2025Updated 10 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- [WIP] A next-generation protector for .NET applications (.NET Framework, .NET Core, and more)☆48Jun 28, 2021Updated 4 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- .NET assembly local/remote loading/injection into memory.☆135Aug 2, 2019Updated 6 years ago
- Bypass AMSI and Defender using Ordinal Values☆41Apr 15, 2020Updated 5 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Extracting Syscall Stub, Modernized☆66Apr 2, 2022Updated 3 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- The program is designed to obfuscate the shellcode.☆202Jul 13, 2021Updated 4 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆32Mar 25, 2021Updated 4 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware