EvilBytecode / Evilbytecode-Anti-VMLinks
Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.
☆21Updated 5 months ago
Alternatives and similar repositories for Evilbytecode-Anti-VM
Users that are interested in Evilbytecode-Anti-VM are comparing it to the libraries listed below
Sorting:
- Kill malawarebytes process. Can be ported to any programming language.☆11Updated 5 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆23Updated 5 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 5 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆43Updated 4 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 5 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆79Updated 3 months ago
- Troll TaskManager, and play with it .☆27Updated 2 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆60Updated 4 months ago
- A COFF Loader written in Rust☆125Updated 3 weeks ago
- ☆69Updated 2 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆122Updated last month
- A mutliple tactics to execute shellcode in go :}☆23Updated 5 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆59Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Windows C++ Implant for Exploration C2☆42Updated last week
- A unique introduction to native runtime obfuscation.☆73Updated 7 months ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Updated 5 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- Beacon Debugger☆55Updated 11 months ago
- ☆40Updated last year
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 11 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- find dll base addresses without PEB WALK☆146Updated 2 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆116Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆100Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆59Updated 4 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆80Updated 5 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated 3 months ago
- A basic C2 framework written in C☆61Updated last year