ksecurity45 / JlaiveLinks
Antivirus Evasion Tool for .NET/Native (x64) Executables
☆20Updated 2 years ago
Alternatives and similar repositories for Jlaive
Users that are interested in Jlaive are comparing it to the libraries listed below
Sorting:
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Small project to facilitate creation of .lnk payloads☆70Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆124Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- C# havoc implant☆100Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- ☆125Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 6 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆81Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated last month
- ☆59Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- Mockingjay process self injection POC☆33Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago