Shellcode obfuscation tool to avoid AV/EDR.
☆131Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for espio
Users that are interested in espio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆104Mar 21, 2025Updated last year
- ☆13Apr 1, 2017Updated 9 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Some demos to bypass EDRs or AVs by 78itsT3@m☆361Jul 6, 2022Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Sep 15, 2022Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆280Sep 5, 2022Updated 3 years ago
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆554Jan 18, 2022Updated 4 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- A Nim implementation of reflective PE-Loading from memory☆301Sep 5, 2024Updated last year
- UAC bypass by abusing RPC and debug objects.☆630Oct 19, 2023Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,114Jun 17, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Awesome AV/EDR/XDR Bypass Tips☆287Apr 23, 2023Updated 3 years ago
- Sleep Obfuscation☆837Dec 3, 2023Updated 2 years ago
- TartarusGate, Bypassing EDRs☆663Jan 25, 2022Updated 4 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆550Feb 13, 2024Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,638Jul 31, 2024Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆243Jan 4, 2023Updated 3 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆323Aug 2, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- dump lsass进程工具☆560Jul 20, 2023Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- In-memory token vault BOF for Cobalt Strike☆150Aug 18, 2022Updated 3 years ago
- C# Based Universal API Unhooker☆410Feb 18, 2022Updated 4 years ago
- 自研的linux_c2☆13Jun 28, 2023Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆233Apr 17, 2023Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆256Jun 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2020-1472 C++☆85Sep 2, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,505Dec 21, 2023Updated 2 years ago
- PE loader with various shellcode injection techniques☆450Oct 17, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆489Jul 12, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆306Jul 31, 2024Updated last year
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Feb 2, 2026Updated 3 months ago