Offensive-Panda / DefenseEvasionTechniques
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedicated to improving their skills in malware development, malware research, offensive security, security defenses and measures.
☆87Updated 2 months ago
Alternatives and similar repositories for DefenseEvasionTechniques:
Users that are interested in DefenseEvasionTechniques are comparing it to the libraries listed below
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆149Updated 8 months ago
- ☆136Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 8 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated last month
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆130Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆157Updated last month
- ☆136Updated 5 months ago
- A set of programs for analyzing common vulnerabilities in COM☆165Updated 4 months ago
- Sleep obfuscation☆199Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆151Updated 3 weeks ago
- Port of Cobalt Strike's Process Inject Kit☆160Updated last month
- Recursive Loader☆102Updated 3 months ago
- ☆102Updated 2 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 6 months ago
- Create Anti-Copy DRM Malware☆50Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆212Updated last month
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆179Updated last year
- ☆161Updated 2 months ago
- A command and control framework.☆40Updated 3 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆179Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆175Updated 2 months ago
- ☆120Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆88Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 5 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆154Updated 4 months ago
- ☆106Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆64Updated 2 months ago
- ☆134Updated 2 months ago