Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
-
Updated
Aug 4, 2024 - C
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Template-Driven AV/EDR Evasion Framework
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Antivirus evasion project
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
AV Evasion Tool For Red Team Ops
PoC Implementation of a fully dynamic call stack spoofer
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
C# Based Universal API Unhooker
Materials for the workshop "Red Team Ops: Havoc 101"
Go shellcode loader that combines multiple evasion techniques
C++ self-Injecting dropper based on various EDR evasion techniques.
Golang library for malware development
An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.
indirect syscalls for AV/EDR evasion in Go assembly
C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
AV bypass while you sip your Chai!
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."