EvilBytecode / Evilbytecode-Anti-VMLinks
Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.
☆21Updated 9 months ago
Alternatives and similar repositories for Evilbytecode-Anti-VM
Users that are interested in Evilbytecode-Anti-VM are comparing it to the libraries listed below
Sorting:
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 9 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Updated 9 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Updated 9 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Updated 9 months ago
- A mutliple tactics to execute shellcode in go :}☆23Updated 9 months ago
- Troll TaskManager, and play with it .☆30Updated 6 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 9 months ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Updated 9 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62Updated 8 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 3 years ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Updated 4 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166Updated 8 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Updated 9 months ago
- Evasive loader to bypass static detection☆59Updated 2 years ago
- ☆48Updated 2 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120Updated 8 months ago
- A COFF Loader written in Rust☆135Updated 2 months ago
- A Python-based VBScript Code Obfuscator☆44Updated 2 months ago
- ☆41Updated last year
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Updated 9 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆61Updated 5 months ago
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago