cocomelonc / 2022-06-05-malware-av-evasion-7Links
Malware AV evasion via disable Windows Defender (Registry). C++
☆35Updated 3 years ago
Alternatives and similar repositories for 2022-06-05-malware-av-evasion-7
Users that are interested in 2022-06-05-malware-av-evasion-7 are comparing it to the libraries listed below
Sorting:
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- Simple API Hooks detector☆73Updated 2 years ago
- ☆73Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆29Updated 5 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- using the gpu to hide your payload☆59Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- ☆37Updated 4 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- API Hammering with C++20☆49Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- Next gen process injection technique☆54Updated 5 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆138Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆31Updated 3 years ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated 11 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆22Updated 8 months ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆31Updated 11 months ago