gemini-security / Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell
Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell
β39Updated last year
Alternatives and similar repositories for Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell:
Users that are interested in Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell are comparing it to the libraries listed below
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated last year
- γπγProof of concept on BYOVD attackβ155Updated 3 months ago
- Terminate AV/EDR leveraging BYOVD attackβ82Updated last week
- reflectively load and execute PEs locally and remotely bypassing EDR hooksβ151Updated last year
- AV bypass while you sip your Chai!β218Updated 10 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.β59Updated 8 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defenderβ26Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β80Updated last year
- Malicious powershell scripts loader designed to avoid detection.β49Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when β¦β82Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 10 months ago
- Havoc C2 profile generatorβ74Updated 5 months ago
- .bin file to shellcode convertorβ34Updated 8 months ago
- Bypass Malware Sandbox Evasion Ram checkβ137Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ74Updated 2 years ago
- β96Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ117Updated last week
- Shaco is a linux agent for havocβ157Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- β121Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.β90Updated 9 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β158Updated 9 months ago
- β114Updated this week
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educatβ¦β90Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β149Updated last year
- Execute shellcode files with rundll32β195Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.β216Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookieβ192Updated 10 months ago