Bypassing antivirus detection: old-school malware, new tricks
☆67May 10, 2023Updated 2 years ago
Alternatives and similar repositories for bypassing-av-detection
Users that are interested in bypassing-av-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆135Mar 5, 2023Updated 3 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated last month
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 5 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆789Jan 9, 2025Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- AV bypass while you sip your Chai!☆223May 17, 2024Updated last year
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆505Dec 19, 2023Updated 2 years ago
- Offensive Powershell obfuscator☆27Sep 6, 2024Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- “谛听”(discern)资产识别分析平台,一个简化版的物联网设备信息安全搜索引擎,IOT—Scanner的迭代优化版本。 目前集成了主机发现、端口扫描、设备识别、漏洞匹配、poc验证等功能。☆17Feb 6, 2021Updated 5 years ago
- A nice process dumping tool☆82Jul 19, 2022Updated 3 years ago
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆230Jan 20, 2024Updated 2 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆389Oct 8, 2024Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆41Dec 7, 2025Updated 3 months ago
- Bypass LSA protection using the BYODLL technique☆175Sep 21, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- ☆16Mar 26, 2023Updated 3 years ago