OffensivePipeline
Evasion toolkit
A tool for modifying and building C# tools to evade detection in Red Team exercises
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
791 stars
19 watching
147 forks
Language: C#
last commit: over 1 year ago
Linked from 1 awesome list
buildcsharpredteamwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 |
| A collection of sandbox evasion modules written in various programming languages. | 904 |
| A toolset designed to evade detection by security products and execute malware safely | 1,421 |
| Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
| A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager | 93 |
| A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| An AntiVirus Evasion Tool allowing developers to experiment with and create various evasion techniques for Windows executable files | 1,660 |
| A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,133 |
| A tool for integrating Cobalt Strike payloads with ScareCrow to evade antivirus detection and improve evasion capabilities. | 457 |
| An AntiVirus Evasion Tool for Windows systems using assembly shellcodes and encoding techniques. | 4 |
| A tool designed to bypass antivirus software and evade detection. | 691 |
| An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
| A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 |
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| A collection of tools and scripts used to simulate cyber attacks | 533 |