All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
-
Updated
Jun 17, 2024 - C#
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Inject your x64 bit executable to any process, masking it as a legitimate process for Anti-Virus evasion.
Meterpreter Encrypted Payload by C#
Tool to evade Antivirus With Different Techniques
NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
Patrick crypter encodes your .NET applications to stop AV alerts
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
Penetration Test / Read Team - C# tools repository
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
ShellCodeLoader via DInvoke
Load shellcode via syscall
MappingInjection via csharp
基于csharp实现的免杀shellcode加载器
Lime Crypter Obfuscator Mod
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
Compiling Csharp in-memory and Execute to bypass AVs
Add a description, image, and links to the bypass-antivirus topic page so that developers can more easily learn about it.
To associate your repository with the bypass-antivirus topic, visit your repo's landing page and select "manage topics."