There are 21 repositories under av-evasion topic.
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
PoC Implementation of a fully dynamic call stack spoofer
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
C# Based Universal API Unhooker
C++ self-Injecting dropper based on various EDR evasion techniques.
Materials for the workshop "Red Team Ops: Havoc 101"
An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
An online AV evasion platform written in Springboot (Golang, Nim, C) supports inline, local and remote loading of Shellocde methods.
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
PowerShell Obfuscator. A PowerShell script anti-virus evasion tool
Extracting Syscall Stub, Modernized
Penetration Test / Read Team - C# tools repository
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service path, etc. The payload itself can be remotely hosted, downloaded via the wininet library and then executed via direct system calls.
Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.
Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.