XShar / BypassAV_FrameworkLinks
Test antiviruses
☆12Updated last year
Alternatives and similar repositories for BypassAV_Framework
Users that are interested in BypassAV_Framework are comparing it to the libraries listed below
Sorting:
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆13Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 10 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆77Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆51Updated 3 years ago
- Direct syscalls Injection to bypass AV/EDR☆12Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 5 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆50Updated last year
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆27Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆90Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆81Updated 6 months ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- A care package of useful bofs for red team engagments☆55Updated 10 months ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆35Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last month
- Red Team Operation's Defense Evasion Technique.☆54Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆32Updated 11 months ago