vvelitkn / Evasion-Escaper
Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environment or sandbox, and to pass all such checks successfully.
☆105Updated last month
Alternatives and similar repositories for Evasion-Escaper:
Users that are interested in Evasion-Escaper are comparing it to the libraries listed below
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- ☆135Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆136Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆181Updated last year
- ☆95Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆215Updated last year
- Detect strange memory regions and DLLs☆180Updated 3 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- Exploitation of process killer drivers☆198Updated last year
- ☆112Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- Windows LPE exploit for CVE-2022-37969☆133Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆65Updated 4 years ago
- ☆133Updated last year
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆205Updated 2 years ago
- An example reference design for a proposed BOF PE☆126Updated last month
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- ☆51Updated 5 months ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆164Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆142Updated 4 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆95Updated last year
- ☆78Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆71Updated 3 years ago
- It's pointy and it hurts!☆124Updated 2 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆61Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- ☆112Updated 2 years ago