evasion
Here are 158 public repositories matching this topic...
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
-
Updated
Mar 11, 2021 - C++
Just another process dumping tool for Windows, supporting network delivery and snapshots
-
Updated
May 13, 2024 - C++
Highly customized fork. Generates payloads for basic intrusion-detection avoidance, utilizing techniques from several sources.
-
Updated
Nov 25, 2019 - Python
A Data Visualization Tool related to evasion in the context of undergraduate courses at CIn (Centro de Informática). Built using Next.js
-
Updated
May 9, 2022 - TypeScript
Asteroids evasion using OpenAI's gym Reinforcement Learning (RL) package - M.Sc. Thesis in Computer Science, Ben Gurion University Ben Gurion University of the Negev, Israe
-
Updated
Apr 10, 2023 - Python
This is a malware manipulation environment for OpenAI's gym
-
Updated
Jul 31, 2017 - Python
A daemonized DDexec.
-
Updated
Oct 26, 2023 - PHP
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
-
Updated
Feb 19, 2024 - Java
📊 Sistema de Monitoramento de Evasão de Alunos
-
Updated
Nov 28, 2017 - HTML
A generator for a simple way using polymorphic capabilities of obfuscating Python3 based payload using a simple key, transposition with ROT-13, and substitution of whitespaces with random number of hashtags
-
Updated
Apr 7, 2023 - Python
A python script that modifies file timestamps based on your input.
-
Updated
Apr 12, 2024 - Python
Repository to publish your evasion techniques and contribute to the project
-
Updated
Sep 30, 2023 - C++
Malvm is a tool to create modified Windows 10/ 7 virtual machines, where malware is not able to detect its virtual environment. Those VMs can be used to analyze malware.
-
Updated
Sep 11, 2023 - Python
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.
-
Updated
Jan 24, 2024 - C
Improve this page
Add a description, image, and links to the evasion topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the evasion topic, visit your repo's landing page and select "manage topics."