cocomelonc / 2022-06-05-malware-av-evasion-7Links
Malware AV evasion via disable Windows Defender (Registry). C++
☆35Updated 3 years ago
Alternatives and similar repositories for 2022-06-05-malware-av-evasion-7
Users that are interested in 2022-06-05-malware-av-evasion-7 are comparing it to the libraries listed below
Sorting:
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Bypass Malware Time Delays☆105Updated 3 years ago
- ☆74Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 6 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- ☆37Updated 7 months ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆138Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Simple API Hooks detector☆74Updated 3 years ago
- using the gpu to hide your payload☆63Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- API Hammering with C++20☆49Updated 3 years ago
- simple user-mode Rootkit☆107Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 4 months ago
- Process Injection: APC Injection☆32Updated 4 years ago
- Simple x86 Trampoline Hook☆42Updated 3 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- Red Team Operation's Defense Evasion Technique.☆54Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- ☆16Updated 4 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆64Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆57Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆52Updated 2 years ago
- Hellokitty Ransomware Source Code☆17Updated 2 years ago