gemini-security / Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell
Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell
β40Updated 2 years ago
Alternatives and similar repositories for Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell:
Users that are interested in Bypass-Windows-Defender-with-CPP-.DLL-Payload-File---Meterpreter-Reverse-Shell are comparing it to the libraries listed below
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- Malicious powershell scripts loader designed to avoid detection.β51Updated last year
- γπγProof of concept on BYOVD attackβ157Updated 4 months ago
- Bypass Malware Sandbox Evasion Ram checkβ137Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- .bin file to shellcode convertorβ34Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 11 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooksβ149Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β82Updated last year
- AV bypass while you sip your Chai!β220Updated 11 months ago
- Terminate AV/EDR leveraging BYOVD attackβ83Updated 3 weeks ago
- A C2 framework built for my bachelors thesisβ55Updated 5 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.β60Updated 9 months ago
- C or BOF file to extract WebKit master key to decrypt user cookieβ191Updated 11 months ago
- Patching AmsiOpenSession by forcing an error branchingβ145Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ136Updated last year
- C# havoc implantβ99Updated 2 years ago
- Modules used by the Havoc Frameworkβ229Updated 10 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educatβ¦β90Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- Create Anti-Copy DRM Malwareβ55Updated 7 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.β96Updated last year
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.β50Updated last week
- ApexLdr is a DLL Payload Loader written in Cβ108Updated 9 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard inβ¦β104Updated last year
- Evasive Golang Loaderβ131Updated 8 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ122Updated 2 weeks ago
- Windows Kernel Offensive Toolsetβ119Updated 7 months ago