Skip to content

ksecurity45/Jlaive

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Jlaive

Jlaive is an antivirus evasion tool that can convert executables into undetectable batch files. Obfuscated .NET assemblies are not guaranteed to work.

Join the Discord server for discussion and enquiries: https://discord.gg/Qzyq3Dqn82.

image

Features

  • .NET/Native (x64) support
  • AES/XOR encryption
  • Compression
  • Anti Debug
  • Anti VM
  • Melt file (self delete)
  • Bind files
  • AMSI bypass
  • ETW bypass
  • API unhooking

Screenshots

image image

Demo video with AsyncRat vs Microsoft Defender: https://vimeo.com/717794371

Donate

XMR: 47sQ8jVWGtb8iA5zJnnHmfFmu8GwibMs94JbhtutW9HNeYx9UAxWUNNF3NfE79pGm8bCBCFaF3R6CQEYADoF5Uv38m25SNt

Known issues

  • Hidden option does not work on Windows Terminal.
  • Not compatible with Python EXEs.

To-do

  • Fix XOR encryption
  • Implement new GUI

Credits

C# RunPE: https://github.com/nettitude/RunPE

SharpUnhooker: https://github.com/GetRektBoy724/SharpUnhooker

Disclaimer

This project was made for educational purposes only. I am not responsible if you choose to use this illegally/maliciously.

About

Antivirus Evasion Tool for .NET/Native (x64) Executables

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C# 95.3%
  • PowerShell 4.7%