ThreadStackSpoofer
Evasion technique
An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts.
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
1k stars
28 watching
177 forks
Language: C++
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An advanced in-memory evasion technique for hiding malicious code from scanners by fluctuating shellcode's memory protection and encrypting its contents. | 957 |
| A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| A collection of sandbox evasion modules written in various programming languages. | 904 |
| A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. | 887 |
| A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
| A comprehensive repository detailing web3 evasion techniques and their application in malware detection. | 4 |
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
| A toolset designed to evade detection by security products and execute malware safely | 1,421 |
| A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 |
| A collection of tools to generate and modify shellcode profiles to evade detection in Cobalt Strike | 384 |
| A tool for generating and uploading malicious executable files to evade antivirus detection | 206 |
| A tool for modifying and building C# tools to evade detection in Red Team exercises | 791 |
| A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code | 509 |
| A PowerShell evasion tool that uses a DLL to bypass security measures and execute a hidden stager | 93 |