Fully-Undetectable-Techniques
Detection evasion tools
A collection of low-level techniques and tools to evade detection in software
368 stars
20 watching
59 forks
Language: C
last commit: about 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
ed1s0nz/cool | A tool designed to bypass antivirus software and evade detection. | 689 |
0xsp-srd/mortar | A toolset designed to evade detection by security products and execute malware safely | 1,413 |
arvanaghi/checkplease | A collection of sandbox evasion modules written in various programming languages. | 898 |
zha0gongz1/desertfox | A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
wbglil/beacon_re | A project that explores the use of beacon strikes in cobalt strike beacons to evade detection | 86 |
b4rtik/hiddenpowershelldll | A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager | 93 |
rkervella/carbonmonoxide | A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 23 |
epi052/rustdsplit | Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
yingtongdou/care-gnn | An implementation of a graph neural network-based fraud detector designed to counter camouflaged fraudsters | 246 |
joshfaust/alaris | A low-level shellcode loader designed to bypass modern EDR systems and protect malware execution flows. | 888 |
kyleavery/aceldr | A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. | 878 |
johnnyxmas/scancannon | Automated network vulnerability scanning and reconnaissance tool | 432 |
apehex/web3-evasion-techniques | A comprehensive repository detailing web3 evasion techniques and their application in malware detection. | 4 |
eddiezab/aggressor-scripts | A collection of scripts and tools for testing and exploiting network and system vulnerabilities. | 1 |
mgeeky/redwarden | A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 926 |