EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.
☆61Nov 17, 2025Updated 4 months ago
Alternatives and similar repositories for Bypass-Protection0x00
Users that are interested in Bypass-Protection0x00 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆15May 30, 2025Updated 9 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆77Jun 16, 2025Updated 9 months ago
- ☆25Apr 30, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Core Submodule of Exploration C2☆24Jan 27, 2026Updated last month
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 7 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- ☆15Mar 17, 2025Updated last year
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆20Sep 30, 2022Updated 3 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- The Windows driver and device management program for NDAS devices such as the NetDISK.☆16Jun 17, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 7 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- Obfuscate Python code, stage payloads, and evade defenses☆23Mar 10, 2026Updated 2 weeks ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆37Mar 11, 2026Updated 2 weeks ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Create Anti-Copy DRM Malware☆72Aug 19, 2024Updated last year
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- One gate to all syscalls!☆23Mar 12, 2022Updated 4 years ago
- ☆13Mar 28, 2024Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- P2P Mesh C2 framework (C implants + Python server + Dashboard) for resilient red‑team ops☆12Aug 22, 2025Updated 7 months ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- ☆12Sep 1, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Sep 23, 2017Updated 8 years ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆41Nov 23, 2025Updated 4 months ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆91Mar 10, 2026Updated 2 weeks ago
- A Simple PoC☆22May 24, 2024Updated last year
- GPT fdisk partitioning tool for use under UEFI environments.☆17Nov 27, 2024Updated last year
- Short list of indirect prompt injection attacks for OpenAI-based models.☆39Aug 27, 2025Updated 6 months ago