vvelitkn / Evasion-Escaper
Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environment or sandbox, and to pass all such checks successfully.
☆105Updated last month
Alternatives and similar repositories for Evasion-Escaper:
Users that are interested in Evasion-Escaper are comparing it to the libraries listed below
- ETW based POC to identify direct and indirect syscalls☆180Updated last year
- ☆135Updated 2 years ago
- ☆78Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- Detect strange memory regions and DLLs☆180Updated 3 years ago
- ☆154Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- ☆94Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- Windows LPE exploit for CVE-2022-37969☆132Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆136Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆203Updated 2 years ago
- ☆112Updated 2 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆214Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- ☆112Updated 2 years ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆131Updated last week
- Files for http://blog.deniable.org/posts/windows-callbacks/☆71Updated 3 years ago
- It's pointy and it hurts!☆123Updated 2 years ago
- ☆134Updated last year
- Experiment on reproducing Obfuscate & Sleep☆141Updated 4 years ago
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- ☆37Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated this week
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated 2 years ago
- EDRSandblast-GodFault☆250Updated last year
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆99Updated 2 years ago