Tool for easy clean PE32 from AV signature
-
Updated
Jul 27, 2016 - Python
Tool for easy clean PE32 from AV signature
Script which helps the creation of antivirus evading malware.
This is a malware manipulation environment for OpenAI's gym
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
🎭 Anti virus evasion based on file signature change via AES encryption with Powershell and C# AV evasion templates which support executable and Powershell payloads with Windows executable, Powershell or batch output. Developed with Powershell on Linux for Windows targets :)
reverse shell
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Fud Persistent Windows Backdoor developed purely in python
Using bitsadmin to download our malware and to bypass defender
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
Fast & Silent Script For Rubber Ducky To Inject Reverse Shell
Old 32 bit PE executable protector / crypter
AV Evasion Tool For Red Team Ops
Penetration Test / Read Team - C# tools repository
Beacon Object File PoC implementation of KillDefender
An AV exclusion enumeration tool written in Python.
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."