AV Evasion Techniques
☆83Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for evasion
Users that are interested in evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆608Jul 22, 2022Updated 3 years ago
- PEN-300 collection to help you on your exam.☆700Feb 25, 2026Updated last month
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,420Jul 27, 2025Updated 8 months ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆194Nov 15, 2022Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- random code snippets, useful for getting started☆122Nov 29, 2025Updated 4 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- Do some DLL SideLoading magic☆91Sep 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆19Jan 11, 2023Updated 3 years ago
- ☆1,675Apr 14, 2025Updated 11 months ago
- Simple & Powerful PowerShell Script Obfuscator☆592May 13, 2025Updated 10 months ago
- Loads any C# binary in mem, patching AMSI + ETW.☆845Oct 3, 2021Updated 4 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆340Oct 17, 2022Updated 3 years ago
- ☆19Aug 10, 2022Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆257May 25, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,136Nov 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bypass AMSI by patching AmsiScanBuffer☆283Jun 4, 2021Updated 4 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- AutoMSF is a Python script designed for fast generation and deployment of multiple types of Meterpreter reverse_https payloads. Created t…☆19Mar 20, 2025Updated last year
- A windows token impersonation tool☆322Apr 19, 2023Updated 2 years ago
- ☆26Aug 11, 2025Updated 7 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 7 months ago
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- Use hardware breakpoint to dynamically change SSN in run-time☆280Apr 10, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆816Mar 28, 2025Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago