gatariee / gocheckLinks
Because AV evasion should be easy.
☆823Updated 10 months ago
Alternatives and similar repositories for gocheck
Users that are interested in gocheck are comparing it to the libraries listed below
Sorting:
- Real fucking shellcode encryptor & obfuscator tool☆947Updated this week
- Analyse your malware to surgically obfuscate it☆502Updated 4 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆721Updated 2 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,193Updated 2 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆648Updated last month
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,024Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,184Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆490Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆568Updated 9 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆832Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆569Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,186Updated last month
- Simulate the behavior of AV/EDR for malware development training.☆545Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆342Updated 2 years ago
- Shellcode loader generator with multiples features☆496Updated 9 months ago
- Lifetime AMSI bypass☆656Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,367Updated this week
- Golang library for malware development☆369Updated 11 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆712Updated 5 months ago
- Performing Indirect Clean Syscalls☆582Updated 2 years ago
- Protected Process Dumper Tool☆567Updated 2 years ago
- shellcode loader for your evasion needs☆343Updated 5 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆682Updated 5 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,347Updated last month
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,005Updated last week
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆496Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆566Updated last year
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆673Updated 2 weeks ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,029Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆307Updated 3 weeks ago