Bypassing antivirus detection: old-school malware, new tricks
☆68May 10, 2023Updated 2 years ago
Alternatives and similar repositories for bypassing-av-detection
Users that are interested in bypassing-av-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆134Mar 5, 2023Updated 3 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 2 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆108Feb 25, 2025Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 6 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆792Jan 9, 2025Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- AV bypass while you sip your Chai!☆222May 17, 2024Updated last year
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- Offensive Powershell obfuscator☆27Sep 6, 2024Updated last year
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sleep obfuscation for shellcode implants and their reflective shit☆55Sep 19, 2023Updated 2 years ago
- “谛听”(discern)资产识别分析平台,一个简化版的物联网设备信息安全搜索引擎,IOT—Scanner的迭代优化版本。目前集成了主机发现、端口扫描、设备识别、漏洞匹配、poc验证等功能。☆17Feb 6, 2021Updated 5 years ago
- A nice process dumping tool☆82Jul 19, 2022Updated 3 years ago
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆239Jan 20, 2024Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆22Dec 15, 2024Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆392Oct 8, 2024Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆43Dec 7, 2025Updated 4 months ago
- Bypass LSA protection using the BYODLL technique☆178Sep 21, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 8 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆349Nov 19, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- ☆16Mar 26, 2023Updated 3 years ago