vvelitkn / Evasion-EscaperLinks
Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environment or sandbox, and to pass all such checks successfully.
☆107Updated 5 months ago
Alternatives and similar repositories for Evasion-Escaper
Users that are interested in Evasion-Escaper are comparing it to the libraries listed below
Sorting:
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆103Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated last year
- ☆96Updated 3 years ago
- ☆142Updated 2 years ago
- ☆113Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- Detect strange memory regions and DLLs☆185Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- ☆114Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆138Updated 2 years ago
- ☆107Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆68Updated last month
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated last month
- ☆86Updated last year
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago
- Windows LPE exploit for CVE-2022-37969☆135Updated 2 years ago
- ☆135Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆83Updated 3 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆96Updated this week
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 3 months ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆46Updated last year
- Hide memory artifacts using ROP and hardware breakpoints.☆146Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago