Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
-
Updated
Jun 17, 2020 - C++
Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
Research on Anti-malware and other related security solutions
My own implementation of the process herpaderping evasion technique
Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Shellcode obfuscation tool to avoid AV/EDR.
Repository to publish your evasion techniques and contribute to the project
无可执行权限加载 ShellCode。Loading ShellCode without executable permission.
Add a description, image, and links to the antivirus-evasion topic page so that developers can more easily learn about it.
To associate your repository with the antivirus-evasion topic, visit your repo's landing page and select "manage topics."