Karmaz95 / evasionView external linksLinks
AV Evasion Techniques
☆83Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for evasion
Users that are interested in evasion are comparing it to the libraries listed below
Sorting:
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 2 years ago
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- ☆26Aug 11, 2025Updated 6 months ago
- PEN-300 collection to help you on your exam.☆686Aug 15, 2025Updated 5 months ago
- random code snippets, useful for getting started☆123Nov 29, 2025Updated 2 months ago
- Do some DLL SideLoading magic☆89Sep 20, 2023Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆600Jul 22, 2022Updated 3 years ago
- Simple & Powerful PowerShell Script Obfuscator☆590May 13, 2025Updated 9 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Nov 15, 2022Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,407Jul 27, 2025Updated 6 months ago
- A PowerShell module for exporting, importing, removing, permissioning, publishing Active Directory Certificate Templates. It also include…☆95Jul 2, 2024Updated last year
- Patch AMSI and ETW☆250May 8, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Jul 7, 2022Updated 3 years ago
- ☆20Jan 11, 2023Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆256May 25, 2023Updated 2 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Creating a Malicious Macro using MS Word☆25Jun 10, 2022Updated 3 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆813Mar 28, 2025Updated 10 months ago
- ☆335May 29, 2023Updated 2 years ago
- Bypass AMSI by patching AmsiScanBuffer☆278Jun 4, 2021Updated 4 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆16Jun 15, 2025Updated 7 months ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- Malware development for red teaming workshop☆225Nov 15, 2021Updated 4 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,127Nov 28, 2024Updated last year
- ☆1,665Apr 14, 2025Updated 9 months ago
- Windows AV Evasion☆832Apr 13, 2020Updated 5 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month