Identifies the bytes that Microsoft Defender flags on.
-
Updated
Sep 14, 2023 - C#
Identifies the bytes that Microsoft Defender flags on.
C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses
C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
PoC Windows Usermode Rootkit made in C# and C++, made to show you how to protect your process using hooking.
Detect virtual environment
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)
This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course
Compiling Csharp in-memory and Execute to bypass AVs
NativePayload_DIM Dynamic native dll Injection in Memory , Injecting Native DLL bytes to local Process
Shellcode injection or execution via AddressOfEntryPoint hijack.
NativePayload_ASM/AsynASM , Injecting Meterpreter Payload bytes into local Process via Delegation Technique [Technique D] + in-memory with delay Changing RWX to X [Bypassing AVs]
Loading Csharp C2 Client-side codes in RAM by Very Simple New Technique to avoid Detection
Compiling Csharp in-memory and Execute to bypass AVs
R.I.P. MrAnon/MrAnonTools/MrAnon666. This is free release for all kids who got scammed/ghosted by gentleman mentioned above. Have fun! ^^
Add a description, image, and links to the evasion topic page so that developers can more easily learn about it.
To associate your repository with the evasion topic, visit your repo's landing page and select "manage topics."