Fully-Undetectable-Techniques

Detection evasion tools

A collection of low-level techniques and tools to evade detection in software

GitHub

368 stars
20 watching
59 forks
Language: C
last commit: about 3 years ago

Related projects:

Repository Description Stars
ed1s0nz/cool A tool designed to bypass antivirus software and evade detection. 689
0xsp-srd/mortar A toolset designed to evade detection by security products and execute malware safely 1,413
arvanaghi/checkplease A collection of sandbox evasion modules written in various programming languages. 898
zha0gongz1/desertfox A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection 125
wbglil/beacon_re A project that explores the use of beacon strikes in cobalt strike beacons to evade detection 86
b4rtik/hiddenpowershelldll A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager 93
rkervella/carbonmonoxide A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. 23
epi052/rustdsplit Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. 35
yingtongdou/care-gnn An implementation of a graph neural network-based fraud detector designed to counter camouflaged fraudsters 246
joshfaust/alaris A low-level shellcode loader designed to bypass modern EDR systems and protect malware execution flows. 888
kyleavery/aceldr A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. 878
johnnyxmas/scancannon Automated network vulnerability scanning and reconnaissance tool 432
apehex/web3-evasion-techniques A comprehensive repository detailing web3 evasion techniques and their application in malware detection. 4
eddiezab/aggressor-scripts A collection of scripts and tools for testing and exploiting network and system vulnerabilities. 1
mgeeky/redwarden A tool to evade detection by security systems and incident responders by manipulating HTTP requests 926