EvilBytecode / GoDefender
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
β600Updated 2 weeks ago
Alternatives and similar repositories for GoDefender:
Users that are interested in GoDefender are comparing it to the libraries listed below
- Because AV evasion should be easy.β668Updated 3 months ago
- Golang library for malware developmentβ344Updated 3 months ago
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β530Updated last month
- Golang weaponization for red teamers.β489Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ813Updated 2 weeks ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders impβ¦β298Updated 5 months ago
- Shellcode loader generator with multiples featuresβ457Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.β525Updated last week
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,131Updated 3 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscallsβ364Updated 5 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Poolsβ1,064Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β409Updated last year
- Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protectionβ¦β336Updated 4 months ago
- Windows Kernel Rootkit in Rustβ469Updated last week
- Evasive shellcode loaderβ346Updated 4 months ago
- shellcode loader for your evasion needsβ316Updated 4 months ago
- Analyse your malware to surgically obfuscate itβ454Updated 2 weeks ago
- Shoggoth: Asmjit Based Polymorphic Encryptorβ706Updated 11 months ago
- β302Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)β754Updated 2 weeks ago
- AV/EDR Evasion Lab for Training & Learning Purposesβ1,204Updated 3 weeks ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deploymentβ573Updated 3 weeks ago
- Simulate the behavior of AV/EDR for malware development training.β501Updated last year
- β224Updated 2 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird β¦β640Updated 4 months ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote processβ253Updated last year
- COM ViewLogger β new malware keylogging techniqueβ344Updated 2 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processesβ951Updated last year
- Evasion by machine code de-optimization.β370Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β340Updated 5 months ago