efchatz / bypassing-av-detectionLinks
Bypassing antivirus detection: old-school malware, new tricks
☆62Updated 2 years ago
Alternatives and similar repositories for bypassing-av-detection
Users that are interested in bypassing-av-detection are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Do some DLL SideLoading magic☆83Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆169Updated 2 years ago
- Null-free shellcode for TCP reverse shell on Windows x64☆56Updated last year
- ☆124Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆153Updated last year
- Template-based generation of shellcode loaders☆77Updated last year
- Windows Kernel Offensive Toolset☆124Updated 9 months ago
- ApexLdr is a DLL Payload Loader written in C☆110Updated 10 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆60Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniques☆231Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆66Updated last month
- Reflective DLL Injection Made Bella☆227Updated 5 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated last month
- random code snippets, useful for getting started☆120Updated 6 months ago
- ☆85Updated last year
- Malware?☆70Updated 7 months ago
- PE obfuscator with Evasion in mind☆212Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- ☆185Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆129Updated 2 years ago
- Shaco is a linux agent for havoc☆161Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Your syscall factory☆123Updated last week
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆231Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆331Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago