Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
🌟[NEW] Log by Telegram+Clipper ✅ [0/70] FUD Stealer can bypass all antivirus (Our Grabber can grabs: Wallets, Passwords, Credit Card, Cookies, Autofills, All Discord Token and info, Telegram, Twitter...
Red Team C2 Framework with AV/EDR bypass capabilities.
🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educ...
ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both th...
How to bypass windows defender by forcing uac
Bypass Windows Defender with a persistent staged reverse shell using C code & metasploit framework
Generate obfuscated PowerShell commands using XOR logic with random keys!
A simple, obfuscated in-memory injection script written in PowerShell that bypasses Windows Defender
Windows RAT w/ antivirus bypass.
Hybrid Encryption Dropper with HWID system.
Anti Malware Scan Interface (DLL) Bypass
WinRM Reverse Shell Using Powershell.
[NEW] Log by Telegram+Clipper [0/70] FUD Stealer can bypass all antivirus (Our Grabber can grabs: Wallets, Passwords, Credit Card, Cookies, Autofills, All Discord Token and info, Telegram, Twitter, Ti...