Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for av evasion
av-evasion
x
36 search results found
Cloakify
⭐
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
R77 Rootkit
⭐
1,351
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Inceptor
⭐
1,295
Template-Driven AV/EDR Evasion Framework
Defeat Defender V1.2.0
⭐
1,233
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Aviator
⭐
1,018
Antivirus evasion project
Spookflare
⭐
935
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Foureye
⭐
566
AV Evasion Tool For Red Team Ops
Pe Union
⭐
383
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
Silentmoonwalk
⭐
276
PoC Implementation of a fully dynamic call stack spoofer
Callstackspoofingpoc
⭐
248
C++ self-Injecting dropper based on various EDR evasion techniques.
Maldev
⭐
235
Golang library for malware development
Sharpunhooker
⭐
210
C# Based Universal API Unhooker
Hades
⭐
198
Go shellcode loader that combines multiple evasion techniques
Meterpwrshell
⭐
192
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
Redteamops Havoc 101
⭐
187
Materials for the workshop "Red Team Ops: Havoc 101"
Anticrack Dotnet
⭐
117
C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
Betterxencrypt
⭐
106
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Direct Syscalls Vs Indirect Syscalls
⭐
101
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Inflate.py
⭐
93
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
Tallgrass
⭐
61
An AV exclusion enumeration tool written in Python.
Minerootkit
⭐
52
PoC Windows Usermode Rootkit made in C# and C++, made to show you how to protect your process using hooking.
Tvasion
⭐
48
🎭 Anti virus evasion based on file signature change via AES encryption with Powershell and C# AV evasion templates which support executable and Powershell payloads with Windows executable, Powershell or batch output. Developed with Powershell on Linux for Windows targets :)
Triples
⭐
48
Extracting Syscall Stub, Modernized
Redsharp
⭐
43
Penetration Test / Read Team - C# tools repository
Acheron
⭐
38
indirect syscalls for AV/EDR evasion in Go assembly
Pymemimporter
⭐
36
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
Persistentcreverseshell
⭐
33
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
Signfinder
⭐
24
Tool for easy clean PE32 from AV signature
Gofrette
⭐
24
Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.
Darkbyte
⭐
23
Repository of tools used in my blog
Dllreverseshell
⭐
18
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Aes Encoder
⭐
17
PowerShell Obfuscator. A PowerShell script anti-virus evasion tool
Chuvi Botnet
⭐
13
Fud Persistent Windows Backdoor developed purely in python
Puttyormalware
⭐
10
Using bitsadmin to download our malware and to bypass defender
Nim Reverse Shell
⭐
8
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
Tatecrypter
⭐
5
Related Searches
C Sharp Av Evasion (11)
Malware Av Evasion (10)
1-36 of 36 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.