-
Updated
Nov 24, 2020 - Python
#
av-evasion
Here are 31 public repositories matching this topic...
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
security
cryptography
privacy
cipher
hacking
steganography
infosec
pentesting
pentest
hacking-tool
exfiltration
red-team
dlp
data-exfiltration
security-tools
av-evasion
pentest-tool
stego
hacking-tools
pentest-tools
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
obfuscation
loader
bypass
dropper
antivirus-evasion
av-evasion
av-bypass
antivirus-testing
endpoint-bypass
-
Updated
May 8, 2019 - Python
thisisthelongestusernameyouhaveeverseen
commented
Feb 8, 2022
As the rootkit checks it's config from registry every n seconds
add ability detach and prevent injecting an specified process using it's pid/process name-
by creating a key/value in it's configs
and also ability to temporary disabling and self uninstalling it using same way
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
proof-of-concept
malware
hacking
batch
defender
antivirus
bypass
payload
dropper
bypass-antivirus
fud
av-evasion
undetectable
disable-windows-defender
hack-tool
malware-dropper
bypass-defender
hackwindows
-
Updated
May 1, 2022 - Batchfile
Antivirus evasion project
windows
backdoor
virus
injection
trojan
antivirus
shellcode
bypass
backdoors
crypter
av-evasion
backdooring
antivirus-testing
virus-total
av-b
-
Updated
May 6, 2022 - C#
AV Evasion Tool For Red Team Ops
-
Updated
Dec 8, 2021 - C
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
-
Updated
May 2, 2022 - C#
C# Based Universal API Unhooker
-
Updated
Feb 18, 2022 - C#
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
windows
malware
bypass
metasploit-framework
payload
bypass-antivirus
meterpreter
one-liner
fud
metasploit
av-evasion
bypass-uac
bypass-firewall
stager
amsi
bypass-amsi
-
Updated
Sep 24, 2021
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
-
Updated
Jun 13, 2021 - PowerShell
-
Updated
Sep 24, 2019 - PowerShell
Extracting Syscall Stub, Modernized
-
Updated
Apr 2, 2022 - C#
Penetration Test / Read Team - C# tools repository
windows
c-sharp
reverse-shell
bypass-antivirus
meterpreter
av-evasion
penetration-test
shellcode-injector
-
Updated
Dec 23, 2021 - C#
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
antivirus
bugbounty
antivirus-evasion
av-evasion
av-bypass
endpoint-security
evasion-attack
edr-bypass
-
Updated
Apr 9, 2022 - Python
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
persistence
evasion
reverseshell
bypass-antivirus
fud
av-evasion
av-bypass
complete-fud
persistent-on-boot
-
Updated
May 28, 2019 - C
Tool for easy clean PE32 from AV signature
-
Updated
Jul 27, 2016 - Python
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
reverse-shell
trojan
fud
antivirus-evasion
av-evasion
malware-sample
evade
trojan-rat
av-bypass
backdoors-created
trojan-malware
backdoor-attacks
antiviral-resistance
custom-reverseshell
c-reverseshell
-
Updated
Jun 4, 2019 - C
Fud Persistent Windows Backdoor developed purely in python
python
windows
backdoor
botnet
reverse-shell
malware
trojan
reverse
bypass
bypass-antivirus
fud
av-evasion
undetectable
hack-tool
hack-windows
-
Updated
Mar 1, 2021 - Python
PoC Windows Usermode Rootkit made in C# and C++, made to show you how to protect your process using hooking.
-
Updated
Apr 3, 2022 - C#
Using bitsadmin to download our malware and to bypass defender
hack
bypass
hacking-tool
fud
av-evasion
undetectable
hack-windows
windows-rat
malware-dropper
bypass-defender
-
Updated
Apr 13, 2021 - Visual Basic .NET
Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.
-
Updated
Mar 7, 2022 - Go
An AV exclusion enumeration tool written in Python.
-
Updated
Feb 17, 2022 - Python
reverse shell
-
Updated
Apr 17, 2020 - Python
Beacon Object File PoC implementation of KillDefender
beacon
cobalt-strike
av-evasion
redteaming
bof
redteam
aggressor-script
cobaltstrike-cna
cobaltstrike
defense-evasion
aggressorscript
evade-av
av-evade
-
Updated
Feb 9, 2022 - C
Script which helps the creation of antivirus evading malware.
-
Updated
Mar 25, 2017 - Shell
Old 32 bit PE executable protector / crypter
-
Updated
Nov 29, 2021 - C++
This is a malware manipulation environment for OpenAI's gym
-
Updated
Jul 31, 2017 - Python
Improve this page
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."


Describe the bug
dotnet executable
When compiling the cs files needed for the encoders, the CSC compiler complains and stops the process.
[-] Error: temp\tmpg84fw_q7.cs(26,16777214): error CS1034: Compiler limit exceeded: Line cannot exceed 16777214 charactersTo Reproduce
This happens when passing a binary (in my case ~4MB) into inceptor.
Expected behavior
working