Whitecat18 / Mavoc-AntivirusLinks
A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from system .
☆36Updated last year
Alternatives and similar repositories for Mavoc-Antivirus
Users that are interested in Mavoc-Antivirus are comparing it to the libraries listed below
Sorting:
- ☆164Updated 9 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- ⚠️ Malware Development training ⚠️☆39Updated 9 months ago
- ☆71Updated 10 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆134Updated 6 months ago
- ☆43Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆138Updated last year
- ☆157Updated 6 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Updated 4 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆96Updated 2 weeks ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- ☆89Updated last year
- ☆106Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 9 months ago
- RunPE implementation with multiple evasive techniques☆253Updated 2 months ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- ☆163Updated 2 years ago
- The different ways to dump lsass☆202Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆168Updated 10 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆352Updated last week
- ☆44Updated 11 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated 11 months ago
- ☆112Updated this week
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆252Updated last year