HiddenPowerShellDll

Evasion tool

A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager

GitHub

93 stars
6 watching
33 forks
Language: Batchfile
last commit: about 6 years ago

Related projects:

Repository Description Stars
0xsp-srd/mortar A toolset designed to evade detection by security products and execute malware safely 1,413
phackt/stager.dll A tool that embeds known payloads to evade detection by Windows Defender 170
rkervella/carbonmonoxide A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. 23
zha0gongz1/desertfox A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection 125
joshfaust/alaris A low-level shellcode loader designed to bypass modern EDR systems and protect malware execution flows. 888
arvanaghi/checkplease A collection of sandbox evasion modules written in various programming languages. 898
epi052/rustdsplit Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. 35
mgeeky/redwarden A tool to evade detection by security systems and incident responders by manipulating HTTP requests 926
aetsu/offensivepipeline A tool for modifying and building C# tools to evade detection in Red Team exercises 791
ed1s0nz/cool A tool designed to bypass antivirus software and evade detection. 689
mojtabatajik/robber Tools to detect DLL hijacking vulnerabilities in executable files 765
gnxbr/fully-undetectable-techniques A collection of low-level techniques and tools to evade detection in software 368
hangingsword/houqing A tool for generating and uploading malicious executable files to evade antivirus detection 205
mgeeky/threadstackspoofer An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. 1,042
nul0x4c/atomldr A DLL loader with advanced evasion techniques to bypass user-land hooks and load malicious payloads. 654