vvelitkn / Evasion-Escaper
Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environment or sandbox, and to pass all such checks successfully.
☆106Updated 3 months ago
Alternatives and similar repositories for Evasion-Escaper:
Users that are interested in Evasion-Escaper are comparing it to the libraries listed below
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- ETW based POC to identify direct and indirect syscalls☆186Updated 2 years ago
- Detect strange memory regions and DLLs☆183Updated 3 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆137Updated 2 years ago
- ☆140Updated 2 years ago
- ☆96Updated 3 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆195Updated 11 months ago
- Finding secrets in kernel and user memory☆115Updated last year
- ☆115Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆107Updated last year
- ☆136Updated last year
- It's pointy and it hurts!☆125Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆101Updated 2 years ago
- ☆113Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆217Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆171Updated 2 years ago
- Exploitation of process killer drivers☆200Updated last year
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆132Updated 2 months ago
- An example reference design for a proposed BOF PE☆163Updated 3 weeks ago
- I have documented all of the AMSI patches that I learned till now☆72Updated last month
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- ☆156Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆98Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆122Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆101Updated last year
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago