Open-Source Shellcode & PE Packer
-
Updated
Feb 3, 2024 - C
Open-Source Shellcode & PE Packer
AV Evasion Tool For Red Team Ops
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
PoC designed to evade userland-hooking anti-virus.
Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !
Research on malware creation and protection
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.
Bypass Windows Defender with a persistent staged reverse shell using C code & metasploit framework
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.
Simple but effective methods to avoid being detected by antivirus
A proof-of-concept demonstrating static antivirus evasion using AES-encrypted shellcode in C. Includes encryption script in Python and a runtime decryption/execution mechanism in Windows.
Add a description, image, and links to the antivirus-evasion topic page so that developers can more easily learn about it.
To associate your repository with the antivirus-evasion topic, visit your repo's landing page and select "manage topics."