ghostpepper108 / EvasionLinks
☆107Updated 2 years ago
Alternatives and similar repositories for Evasion
Users that are interested in Evasion are comparing it to the libraries listed below
Sorting:
- Do some DLL SideLoading magic☆89Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- random code snippets, useful for getting started☆123Updated last month
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆152Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆100Updated 2 years ago
- Create Anti-Copy DRM Malware☆69Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 3 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago
- ☆151Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- Your syscall factory☆126Updated 2 weeks ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆117Updated 3 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- ☆146Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆126Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆196Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- ☆80Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated last year