ksecurity45 / JlaiveLinks
Antivirus Evasion Tool for .NET/Native (x64) Executables
☆21Updated 3 years ago
Alternatives and similar repositories for Jlaive
Users that are interested in Jlaive are comparing it to the libraries listed below
Sorting:
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆113Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- ☆71Updated 6 months ago
- 「💀」Proof of concept on BYOVD attack☆163Updated 9 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆173Updated 6 months ago
- Automated .NET AppDomain hijack payload generation☆127Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- Evasive Golang Loader☆135Updated last year
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- ☆78Updated 2 years ago
- Adversary Emulation Framework☆122Updated 3 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆164Updated last year
- Stage 0☆164Updated 9 months ago
- Small project to facilitate creation of .lnk payloads☆74Updated 2 years ago
- a port of privkit bof for havoc☆23Updated last year
- Mockingjay process self injection POC☆39Updated 2 years ago
- .bin file to shellcode convertor☆38Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆83Updated 5 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…