EvilBytecode / GoDefenderLinks
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
☆642Updated last month
Alternatives and similar repositories for GoDefender
Users that are interested in GoDefender are comparing it to the libraries listed below
Sorting:
- Because AV evasion should be easy.☆730Updated 6 months ago
- Real fucking shellcode encryptor & obfuscator tool☆894Updated 3 weeks ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆557Updated last month
- Golang weaponization for red teamers.☆496Updated last year
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆369Updated 7 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆312Updated 7 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,210Updated 6 months ago
- Shellcode loader generator with multiples features☆480Updated 5 months ago
- Golang library for malware development☆354Updated 6 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆537Updated last month
- shellcode loader for your evasion needs☆327Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- Windows Kernel Rootkit in Rust☆610Updated last week
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,111Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆257Updated 2 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆282Updated 10 months ago
- Now You See Me, Now You Don't☆944Updated 5 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆684Updated 2 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆515Updated last week
- ☆245Updated 4 months ago
- Simulate the behavior of AV/EDR for malware development training.☆528Updated last year
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆644Updated this week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆430Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆285Updated last year
- Evasive shellcode loader☆366Updated 7 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆322Updated 4 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆229Updated last week
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆398Updated last year
- PoCs for Kernelmode rootkit techniques research.☆375Updated 4 months ago
- Collect Windows telemetry for Maldev☆352Updated 3 months ago