XShar / BypassAV_FrameworkLinks
Test antiviruses
☆12Updated 2 years ago
Alternatives and similar repositories for BypassAV_Framework
Users that are interested in BypassAV_Framework are comparing it to the libraries listed below
Sorting:
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆38Updated 3 weeks ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆24Updated 6 months ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 3 months ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- C# havoc implant☆101Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Updated 5 months ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆13Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Direct syscalls Injection to bypass AV/EDR☆12Updated last year
- Do some DLL SideLoading magic☆89Updated 2 years ago