A cybersecurity related blog
-
Updated
Jan 15, 2023 - Ruby
A cybersecurity related blog
A simple HTTPS reverse shell malware implementation written in Go, evading Windows Defender detection via AES
My personal "MUCKCrypter" a longtime project.
Simple C2 via MS Exchange HTTP to evade AV and Network Traffic Restrictions.
Desktop tool to encrypt a string with Blowfish and Base64 encode the result
Hidden in plain sight! the simplest yet most effectively covert way to obfuscate data (e.g., shellcode), no one can tell gibberish from malicious anymore!
Sandbox/Heuristic PowerShell Bypass
WinRM Reverse Shell Using Powershell.
A repository containing utilities related to PowerShell
This is a malware manipulation environment for OpenAI's gym
Obfuscate python code to a single Unicode one liner
Script which helps the creation of antivirus evading malware.
Calculate the Shannon entropy of the provided file.
XMR Miner Malware
This POC provides the ability to execute x86 shellcode in the form of a .bin file based on x86 inline assembly and execution over fibers
Beacon Object File PoC implementation of KillDefender
reverse shell
NTAPI hook bypass with (semi) legit stack trace
Old 32 bit PE executable protector / crypter
Add a description, image, and links to the av-evasion topic page so that developers can more easily learn about it.
To associate your repository with the av-evasion topic, visit your repo's landing page and select "manage topics."