ProcessusT / Bypass-AV-DirectSyscallsLinks
Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de shellcode préalablement obfusqué avec un fonction XOR.
☆30Updated 3 years ago
Alternatives and similar repositories for Bypass-AV-DirectSyscalls
Users that are interested in Bypass-AV-DirectSyscalls are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated 3 weeks ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆110Updated 4 years ago
- Small project to facilitate creation of .lnk payloads☆76Updated 3 years ago
- C# havoc implant☆100Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Updated last year
- random code snippets, useful for getting started☆123Updated 2 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Updated 3 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- ☆75Updated 10 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago