ksecurity45 / Jlaive
Antivirus Evasion Tool for .NET/Native (x64) Executables
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Jlaive
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- ☆118Updated last year
- Just another C2 Redirector using CloudFlare.☆78Updated 6 months ago
- ☆126Updated 3 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆108Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆88Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- ☆142Updated last week
- Do some DLL SideLoading magic☆75Updated last year
- a port of privkit bof for havoc☆22Updated 11 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 11 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆49Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- Reasonably undetected shellcode stager and executer.☆35Updated 2 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- ☆73Updated last year
- ☆25Updated last year