The Wayback Machine - https://web.archive.org/web/20220506185637/https://github.com/topics/av-evasion
Skip to content
#

av-evasion

Here are 31 public repositories matching this topic...

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection

  • Updated Nov 24, 2020
  • Python
inceptor
bestrocker221
bestrocker221 commented Apr 13, 2022

Describe the bug
dotnet executable

When compiling the cs files needed for the encoders, the CSC compiler complains and stops the process.

[-] Error: temp\tmpg84fw_q7.cs(26,16777214): error CS1034: Compiler limit exceeded: Line cannot exceed 16777214 characters

To Reproduce
This happens when passing a binary (in my case ~4MB) into inceptor.

Expected behavior
working

bug good first issue

A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.

  • Updated Jun 4, 2019
  • C

Improve this page

Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."

Learn more