rustdsplit
AV evasion tool
Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection.
At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypass signature-based AV. The tool I used back then is gone, so I wrote this.
35 stars
2 watching
5 forks
Language: Rust
last commit: over 4 years ago antivirusantivirus-evasionctposceosce-preprust
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to bypass antivirus software and evade detection. | 691 |
| An AntiVirus Evasion Tool allowing developers to experiment with and create various evasion techniques for Windows executable files | 1,660 |
| A toolset designed to evade detection by security products and execute malware safely | 1,421 |
| An AntiVirus Evasion Tool for Windows systems using assembly shellcodes and encoding techniques. | 4 |
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| A tool for generating and uploading malicious executable files to evade antivirus detection | 206 |
| A collection of sandbox evasion modules written in various programming languages. | 904 |
| A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. | 887 |
| A tool for integrating Cobalt Strike payloads with ScareCrow to evade antivirus detection and improve evasion capabilities. | 457 |
| An asynchronous HTTP client with TLS and fingerprint spoofing capabilities | 112 |
| A tool designed to evade antivirus detection and deliver payloads | 836 |
| A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
| A tool designed to bypass antivirus software and load malicious shellcode into processes | 177 |
| A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager | 93 |
| A tool to help identify the location of antivirus signatures in binary payloads | 312 |