efchatz / bypassing-av-detectionLinks
Bypassing antivirus detection: old-school malware, new tricks
☆65Updated 2 years ago
Alternatives and similar repositories for bypassing-av-detection
Users that are interested in bypassing-av-detection are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆65Updated last year
- random code snippets, useful for getting started☆121Updated 10 months ago
- Offensive Windows Kernel Toolset☆131Updated 2 months ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Do some DLL SideLoading magic☆86Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆142Updated 2 years ago
- A bunch of scripts and code i wrote.☆144Updated 10 months ago
- Command and Control (C2) framework☆131Updated 4 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆110Updated last year
- Evasive Golang Loader☆135Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆131Updated 4 months ago
- PE obfuscator with Evasion in mind☆212Updated 2 years ago
- Template-based generation of shellcode loaders☆79Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated 2 years ago
- Null-free shellcode for TCP reverse shell on Windows x64☆58Updated last year
- ☆146Updated 10 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆193Updated last year
- ☆164Updated last year
- This repository implements Threadless Injection in C☆172Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated 11 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆87Updated 4 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆179Updated 2 years ago
- ☆121Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆34Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year