Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
-
Updated
Jan 9, 2025 - C
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Template-Driven AV/EDR Evasion Framework
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Antivirus evasion project
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
AV Evasion Tool For Red Team Ops
PoC Implementation of a fully dynamic call stack spoofer
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
C# Based Universal API Unhooker
C++ self-Injecting dropper based on various EDR evasion techniques.
Materials for the workshop "Red Team Ops: Havoc 101"
Go shellcode loader that combines multiple evasion techniques
Golang library for malware development
Multilayered AV/EDR Evasion Framework
An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.
indirect syscalls for AV/EDR evasion in Go assembly
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
AV bypass while you sip your Chai!
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."