Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
-
Updated
Jan 19, 2024 - C
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
🌟[NEW] Log by Telegram+Clipper ✅ [0/70] FUD Stealer can bypass all antivirus (Our Grabber can grabs: Wallets, Passwords, Credit Card, Cookies, Autofills, All Discord Token and info, Telegram, Twitter, TikTok, Twitch, Spotify, Riot Games, Roblox, Steam, Wallet Injection and Backup code ( 2fa/a2f ). 🔑 ⚠Disclaimer: We're not liable for caused damage
🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过
The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables.
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
How to bypass windows defender by forcing uac
The most powerful stealer written in Python 3 and packed with a lot of features.
Red Teaming Tactics and Techniques
Generate obfuscated PowerShell commands using XOR logic with random keys!
Bypass Windows Defender with a persistent staged reverse shell using C code & metasploit framework
Windows RAT w/ antivirus bypass.
Hybrid Encryption Dropper with HWID system.
Anti Malware Scan Interface (DLL) Bypass
A simple, obfuscated in-memory injection script written in PowerShell that bypasses Windows Defender
Actively captures host computer’s clipboard content. Logs keystrokes into a readable text log. Takes a screenshot of host computer by every mouse-click occurrence. Encrypts all logs and images created by the tool. The python code itself is encrypted to hinder detection by anti-virus software.
Add a description, image, and links to the antivirus-bypass topic page so that developers can more easily learn about it.
To associate your repository with the antivirus-bypass topic, visit your repo's landing page and select "manage topics."