ZeroMemoryEx / Bypass-Sandbox-EvasionLinks
Bypass Malware Sandbox Evasion Ram check
☆139Updated 2 years ago
Alternatives and similar repositories for Bypass-Sandbox-Evasion
Users that are interested in Bypass-Sandbox-Evasion are comparing it to the libraries listed below
Sorting:
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆230Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆132Updated last month
- random code snippets, useful for getting started☆121Updated 11 months ago
- Create Anti-Copy DRM Malware☆67Updated last year
- This repository implements Threadless Injection in C☆171Updated last year
- Execute shellcode files with rundll32☆207Updated last year
- Documents Exfiltration project for fun and educational purposes☆143Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 10 months ago
- Native Syscalls Shellcode Injector☆266Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆177Updated 2 years ago
- Remote Shellcode Injector☆220Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated 2 years ago
- ☆163Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆178Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last month
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆197Updated last year
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆223Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆194Updated 2 years ago
- ☆107Updated 2 years ago
- ☆133Updated 3 years ago
- ☆121Updated 7 months ago
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆220Updated 3 years ago