CheckPlease
Evasion tools
A collection of sandbox evasion modules written in various programming languages.
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
904 stars
30 watching
158 forks
Language: Go
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
| A comprehensive repository detailing web3 evasion techniques and their application in malware detection. | 4 |
| An AntiVirus Evasion Tool for Windows systems using assembly shellcodes and encoding techniques. | 4 |
| A tool for modifying and building C# tools to evade detection in Red Team exercises | 791 |
| Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
| An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
| A toolset designed to evade detection by security products and execute malware safely | 1,421 |
| An AntiVirus Evasion Tool allowing developers to experiment with and create various evasion techniques for Windows executable files | 1,660 |
| A tool for integrating Cobalt Strike payloads with ScareCrow to evade antivirus detection and improve evasion capabilities. | 457 |
| A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 |
| A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager | 93 |
| A tool designed to bypass antivirus software and evade detection. | 691 |
| A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| A collection of low-level techniques and tools to evade detection in software | 368 |