ksecurity45 / Jlaive
Antivirus Evasion Tool for .NET/Native (x64) Executables
☆17Updated 2 years ago
Alternatives and similar repositories for Jlaive:
Users that are interested in Jlaive are comparing it to the libraries listed below
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- ☆33Updated 9 months ago
- Just another C2 Redirector using CloudFlare.☆84Updated 8 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- ☆137Updated 6 months ago
- Create Anti-Copy DRM Malware☆51Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- ☆29Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 8 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆109Updated last year
- ☆120Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- .bin file to shellcode convertor☆31Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 5 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆77Updated last month
- Adversary Emulation Framework☆63Updated 6 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- ☆180Updated last year
- 「💀」Proof of concept on BYOVD attack☆154Updated last month
- Automated .NET AppDomain hijack payload generation☆119Updated last month
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- ☆48Updated 3 months ago
- Nim process hollowing loader☆49Updated 5 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- Red Team Operation's Defense Evasion Technique.☆52Updated 7 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 9 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆77Updated 5 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆96Updated last year