av-bypass
There are 37 repositories under av-bypass topic.
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
klezVirus/inceptor
Template-Driven AV/EDR Evasion Framework
hlldz/SpookFlare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
alphaSeclab/anti-av
Resources About Anti-Virus and Anti-Anti-Virus, including 200+ tools and 1300+ posts
SubGlitch1/OSRipper
AV evading OSX Backdoor and Crypter Framework
yutianqaq/AVEvasionCraftOnline
An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.
Cipher7/ChaiLdr
AV bypass while you sip your Chai!
VirtualAlllocEx/Direct-Syscalls-vs-Indirect-Syscalls
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
VirtualAlllocEx/Direct-Syscalls-A-journey-from-high-to-low
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
njcve/inflate.py
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
Sn1r/Nim-Reverse-Shell
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
VirtualAlllocEx/DSC_SVC_REMOTE
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service path, etc. The payload itself can be remotely hosted, downloaded via the wininet library and then executed via direct system calls.
hackerOrionX/ORIONX-FUD-CRYPTER
The only FREE and 100% FUD crypter that will still FUD, work on Windows. Powerfull obfuscator to bypass Anti-Viruses detection.
1captainnemo1/DLLREVERSESHELL
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
1captainnemo1/PersistentCReverseShell
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
Enelg52/Backpack
Golang packer that use process hollowing
VirtualAlllocEx/Create_Thread_Inline_Assembly_x86
This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly
Souhardya/IMProtector
Old 32 bit PE executable protector / crypter
VirtualAlllocEx/Shell-we-Assembly
Shellcode execution via x86 inline assembly based on MSVC syntax
x0reaxeax/SyscallHookBypass
NTAPI hook bypass with (semi) legit stack trace
x0reaxeax/KillHandles
Closes handles of a remote process in attempt to crash it
Lucas310302/Coin-Nest
XMR Miner Malware
VirtualAlllocEx/Create_Thread-Inline_Assembly_x86_Fibers
This POC provides the ability to execute x86 shellcode in the form of a .bin file based on x86 inline assembly and execution over fibers
v-lavrentikov/obfuscator
Binary obfuscation, anti-reversing, anti-debugging and av-bypass framework for Windows
mauricelambert/ReverseShell
This package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).
shaddy43/XOR_Shellcode_Encryptor
This repository contains xor shellcode encryptor that is used to bypass static or signature based detection of malicious shellcodes for Process Injection exploits
OlivierLaflamme/custom_binary_for_reverseshell
custom binary reverseshell in C#
Queered/FUD-ReverseShell
IRC likely reverse shell
24greyhat/Hips
Hidden in plain sight! the simplest yet most effectively covert way to obfuscate data (e.g., shellcode), no one can tell gibberish from malicious anymore!
bobby-tablez/Heuristic-Confuser
Sandbox/Heuristic PowerShell Bypass
KOZ1OL/SAVITAR
Savitar is powerfull tool be carefull !
VBV11/WinRM-Reverse-Shell
WinRM Reverse Shell Using Powershell.
natekali/Pazuzu-Locker
π«π’π΅π±-π€π’π« π π―πΆππ±π¬ π©π¬π π¨π’π― - π«π¬π± π£π¬π― π¦π©π©π’π€ππ© ππ²π―ππ¬π°π’
sinatamari/CPPowershell
AV-Bypass using Encryption and Dynamic API Call in CPP
ByteCorum/Py-Sheild
Program/Library for Python created to protect your code from decompilation and detection by antiviruses
digilolnet/pint-c2
eBPF evading C2