XShar / BypassAV_FrameworkLinks
Test antiviruses
☆12Updated last year
Alternatives and similar repositories for BypassAV_Framework
Users that are interested in BypassAV_Framework are comparing it to the libraries listed below
Sorting:
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Akame is an open-source, shellcode loader written in C++17☆19Updated 4 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆27Updated 9 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- A rework of CMLuaUtil AutoElevated☆27Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆89Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- C# havoc implant☆101Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆49Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated 2 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 3 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆13Updated last year
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11Updated last year