#
evasion
Here are 76 public repositories matching this topic...
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
python
machine-learning
privacy
ai
attack
extraction
inference
artificial-intelligence
evasion
red-team
poisoning
adversarial-machine-learning
blue-team
adversarial-examples
adversarial-attacks
trusted-ai
trustworthy-ai
-
Updated
Apr 25, 2022 - Python
Identifies the bytes that Microsoft Defender flags on.
-
Updated
Jun 25, 2021 - C#
Python antivirus evasion tool
-
Updated
Jan 26, 2021 - Python
good first issue
Good for newcomers
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
-
Updated
Mar 18, 2022 - Pascal
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
python
windows
backdoor
malware
hacking
antivirus
evasion
bypass
bypassing-avs
bypass-av
bypassantivirus
bypass-antivirus
fud
metasploit
antivirus-evasion
bypass-uac
undetectable
-
Updated
Apr 28, 2020 - Python
Enumerate and disable common sources of telemetry used by AV/EDR.
-
Updated
Mar 11, 2021 - C++
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
windows
awesome
powershell
phishing
awesome-list
dde
kerberos
pentest
evasion
windows-exploitation
privilege-escalation
red-teams
-
Updated
Feb 20, 2020
Python AV Evasion Tools
python
backdoor
reverse-shell
malware
injection
dynamic-analysis
pentest
evasion
msfvenom
pe-loader
privilege-escalation
bypass-antivirus
meterpreter
cobalt-strike
fud
metasploit
antivirus-evasion
redteam
undetectable
shellcode-injection
-
Updated
Feb 10, 2022 - Python
Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
control
dll
excel
reverse-engineering
injection
evasion
wscript
bypass-antivirus
scarecrow
exe
edr
cobaltstrike-cna
msiexec
-
Updated
Apr 23, 2022 - Python
C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses
dns
backdoor
antivirus
dns-server
evasion
bypassing
transfer-backdoor-payloads
anti-viruses
dns-traffic
nativepayload-dns
bypassing-avs
antivirus-evasion
-
Updated
Jul 2, 2021 - C#
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
-
Updated
Aug 10, 2019 - C
A technique to run binaries filelessly and stealthily on Linux using dd to replace the shell with another process.
-
Updated
Apr 12, 2022 - Shell
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
sqli
bug-bounty
pentesting
bugbounty
evasion
bughunting
burp-plugin
burpsuite
payload-generator
sqlinjection
burp-extensions
burpsuite-pro
pentesting-tools
-
Updated
Aug 21, 2020 - Python
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
obfuscate
cybersecurity
evasion
cyber-security
bypass-antivirus
phishing-attacks
social-engineering-attacks
social-engineering
cyber-attack
cyberattack
phishing-kit
cybersecurity-education
open-redirects
obfuscate-urls
redteam-tools
cyber-attacks
cybersecurity-awareness
-
Updated
Jan 17, 2022 - Python
IPv4 and IPv6 address rate limiting evasion tool
socket
ipv6
ipv4
rate-limiting
subnet
rate-limit
evasion
ipv4-address
ipv6-address
freebind
anyip
ip-rate-limit
-
Updated
Mar 20, 2022 - C
Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
-
Updated
Jun 17, 2020 - C++
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
dns
shellcode
beacon
evasion
bypass-av
exfiltration
bypass-antivirus
antivirus-evasion
redteam
cobaltstrike
evasion-attack
-
Updated
Jan 19, 2021 - C#
JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
-
Updated
Mar 4, 2022
Detect virtual environment
-
Updated
Apr 25, 2019 - C#
Improve this page
Add a description, image, and links to the evasion topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the evasion topic, visit your repo's landing page and select "manage topics."


Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us