nadrojisk / Jlaive

Antivirus Evasion Tool for .NET/Native (x64) Executables

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Jlaive

Jlaive is an antivirus evasion tool that can convert executables into undetectable batch files. Obfuscated .NET assemblies are not guaranteed to work.

Join the Discord server for discussion and enquiries: https://discord.gg/Qzyq3Dqn82.

image

Features

  • .NET/Native (x64) support
  • AES/XOR encryption
  • Compression
  • Anti Debug
  • Anti VM
  • Melt file (self delete)
  • Bind files
  • AMSI bypass
  • ETW bypass
  • API unhooking

Screenshots

image image

Demo video with AsyncRat vs Microsoft Defender: https://vimeo.com/717794371

Donate

XMR: 47sQ8jVWGtb8iA5zJnnHmfFmu8GwibMs94JbhtutW9HNeYx9UAxWUNNF3NfE79pGm8bCBCFaF3R6CQEYADoF5Uv38m25SNt

Known issues

  • Hidden option does not work on Windows Terminal.
  • Not compatible with Python EXEs.

To-do

  • Fix XOR encryption
  • Implement new GUI

Credits

C# RunPE: https://github.com/nettitude/RunPE

SharpUnhooker: https://github.com/GetRektBoy724/SharpUnhooker

Disclaimer

This project was made for educational purposes only. I am not responsible if you choose to use this illegally/maliciously.

About

Antivirus Evasion Tool for .NET/Native (x64) Executables

License:MIT License


Languages

Language:C# 95.3%Language:PowerShell 4.7%