efchatz / bypassing-av-detection
Bypassing antivirus detection: old-school malware, new tricks
☆57Updated last year
Alternatives and similar repositories for bypassing-av-detection:
Users that are interested in bypassing-av-detection are comparing it to the libraries listed below
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆171Updated 2 years ago
- random code snippets, useful for getting started☆116Updated 3 months ago
- Windows Kernel Offensive Toolset☆119Updated 5 months ago
- Do some DLL SideLoading magic☆79Updated last year
- PE obfuscator with Evasion in mind☆214Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆78Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆125Updated last year
- Template-based generation of shellcode loaders☆75Updated 10 months ago
- Shaco is a linux agent for havoc☆156Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- ☆161Updated last year
- Null-free shellcode for TCP reverse shell on Windows x64☆54Updated last year
- ☆120Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- 「💀」Proof of concept on BYOVD attack☆154Updated 2 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆209Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆200Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Command & Control server and agent written in Rust☆34Updated 2 years ago
- Evasive Golang Loader☆129Updated 7 months ago
- ☆181Updated last year
- ☆107Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆180Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆30Updated 10 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆144Updated 2 years ago