EvilBytecode / Evilbytecode-Anti-VM
Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.
☆19Updated 6 months ago
Alternatives and similar repositories for Evilbytecode-Anti-VM:
Users that are interested in Evilbytecode-Anti-VM are comparing it to the libraries listed below
- GetSyscallStubCGo.☆9Updated 6 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 7 months ago
- C# API for Nidhogg rootkit☆17Updated 10 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated last year
- Ransomware written in go, encrypt - decrypt.☆16Updated 8 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 9 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 3 months ago
- Change hash for a signed pe☆15Updated last year
- ☆52Updated last month
- ☆38Updated 8 months ago
- Windows C++ Implant for Exploration C2☆27Updated 2 weeks ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆62Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- Unhook Ntdll.dll, Go & C++.☆19Updated 7 months ago
- A COFF Loader written in Rust☆61Updated last week
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆37Updated 6 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆10Updated 6 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆42Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- ☆20Updated last year
- Core Submodule of Exploration C2☆14Updated 2 weeks ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- Evasive loader to bypass static detection☆57Updated last year
- A nice process dumping tool☆78Updated 2 years ago
- In-memory hiding technique☆45Updated last month
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- ☆37Updated last week
- BYOVD Technique Example using viragt64 driver☆30Updated 7 months ago