Offensive-Panda / DV_NEW
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
☆46Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for DV_NEW
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 7 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆81Updated 5 months ago
- Do some DLL SideLoading magic☆75Updated last year
- Lateral Movement via the .NET Profiler☆76Updated 5 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- ☆58Updated 11 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆49Updated 3 months ago
- ☆126Updated 3 months ago
- ☆118Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated last month
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆118Updated 3 months ago
- Find DLLs with RWX section☆75Updated last year
- ☆103Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆63Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- ☆117Updated 2 months ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆103Updated 2 months ago
- Just another C2 Redirector using CloudFlare.☆78Updated 6 months ago