FUD PDF EXPLOIT SOURCE CODE, reverse shell using pdf file
-
Updated
Jun 14, 2024 - Python
FUD PDF EXPLOIT SOURCE CODE, reverse shell using pdf file
Hidden in plain sight! the simplest yet most effectively covert way to obfuscate data (e.g., shellcode), no one can tell gibberish from malicious anymore!
XMR Miner Malware
Obfuscate python code to a single Unicode one liner
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
An AV exclusion enumeration tool written in Python.
Fud Persistent Windows Backdoor developed purely in python
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
reverse shell
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
This is a malware manipulation environment for OpenAI's gym
Tool for easy clean PE32 from AV signature
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."