EvilBytecode / GoDefender
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
☆603Updated last week
Alternatives and similar repositories for GoDefender:
Users that are interested in GoDefender are comparing it to the libraries listed below
- Golang weaponization for red teamers.☆490Updated last year
- Because AV evasion should be easy.☆678Updated 4 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆540Updated last week
- Shellcode loader generator with multiples features☆463Updated 3 months ago
- Golang library for malware development☆348Updated 4 months ago
- Windows Kernel Rootkit in Rust☆521Updated 3 weeks ago
- Real fucking shellcode encryptor & obfuscator tool☆815Updated last month
- Evasive shellcode loader☆350Updated 5 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆301Updated 5 months ago
- Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protection…☆338Updated 5 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆527Updated 3 weeks ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆366Updated 5 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,150Updated 4 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆412Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,073Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆238Updated last week
- Now You See Me, Now You Don't☆917Updated 2 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆670Updated 7 months ago
- COM ViewLogger — new malware keylogging technique☆347Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆457Updated last month
- Patching "signtool.exe" to accept expired certificates for code-signing.☆276Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆352Updated 5 months ago
- Collect Windows telemetry for Maldev☆322Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆396Updated 7 months ago
- ☆225Updated 2 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆511Updated 9 months ago
- ☆302Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆656Updated 2 weeks ago
- Simulate the behavior of AV/EDR for malware development training.☆516Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆637Updated last year