Little user-mode AV/EDR evasion lab for training & learning purposes
PoC Implementation of a fully dynamic call stack spoofer
.NET/PowerShell/VBA Offensive Security Obfuscator
Threadless Process Injection through entry point hijacking
indirect syscalls for AV/EDR evasion in Go assembly
C++ self-Injecting dropper based on various EDR evasion techniques.
pure-python implementation of MemoryModule technique to load dll and unm...
Apply a divide and conquer approach to bypass EDRs
Call stack spoofing for Rust
Your syscall factory
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default c...
Implementation of Indirect Syscall technique to pop a calc.exe
Unhook DLL via cleaning the DLL 's .text section