mad-metasploit
Anti-Virus-Evading-Payloads
mad-metasploit | Anti-Virus-Evading-Payloads | |
---|---|---|
1 | 25 | |
371 | 671 | |
- | - | |
10.0 | 5.2 | |
over 1 year ago | 5 months ago | |
Ruby | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mad-metasploit
Anti-Virus-Evading-Payloads
- A Modern Approach to Evading AntiVirus and Bypassing Endpoint Detection
- Evade Windows Defender and other Antivirus/EDR solutions with modern techniques and tactics
- How I crafted malware to evade detection from EDR and AV with little to no code
- Malware detectable by antivirus?
- Advanced AntiVirus Evading Malware Techniques for Bypassing Endpoint Detection
- Evade Windows Defender with Advanced Techniques and Tricks
- Evade Windows Defender and Endpoint Detection with these Advanced Malware Evasion Techniques
- How to Evade Windows Defender and Commercial AV with Msfvenom Payloads
- Continually Updated Resource with TTPs on How to Bypass Antivirus and EDR. Contains Content From Professional Red Teamers to Darkweb Resources
What are some alternatives?
awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things
WindowsKiller - Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
PoC - Advisories, proof of concept files and exploits that have been made public by @pedrib.
WebHackersWeapons - ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Abusing-Roku-APIs - A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and designing custom scripts to mess with friends and family!