CheckPointSW / Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
☆398Updated 7 months ago
Alternatives and similar repositories for Evasions:
Users that are interested in Evasions are comparing it to the libraries listed below
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆731Updated 11 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆731Updated 3 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆694Updated 4 years ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆592Updated 2 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- Live hunting of code injection techniques☆380Updated 5 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆644Updated 11 months ago
- A memory scanning evasion technique☆855Updated 7 years ago
- ☆801Updated 5 years ago
- Expriments☆451Updated 4 months ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆748Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆455Updated 9 months ago
- Dynamic unpacker based on PE-sieve☆705Updated last week
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆418Updated 4 years ago
- A way to delete a locked file, or current running executable, on disk.☆512Updated 6 months ago
- AV/EDR evasion via direct system calls.☆1,839Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- Extract Windows Defender database from vdm files and unpack it☆435Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,123Updated last year
- ☆465Updated last year
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆596Updated 2 years ago
- ☆294Updated 3 years ago
- Evade sysmon and windows event logging☆614Updated 4 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆780Updated 3 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆174Updated last month
- C/C++ source obfuscator for antivirus bypass☆1,024Updated 2 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,509Updated 4 years ago
- collect for learning cases☆575Updated 8 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,007Updated 3 years ago