316 skills found · Page 1 of 11
twintproject / TwintAn advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
cbeuw / CloakA censorship circumvention tool to evade detection by authoritarian state adversaries
sleeyax / Burp Awesome TlsBurp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
TryCatchHCF / CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
samyk / UsbdrivebyUSBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
mgeeky / PackMyPayloadA PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
tanc7 / EXOCET AV EvasionEXOCET - AV-evading, undetectable, payload delivery tool
cbeuw / GoQuietA Shadowsocks obfuscation plugin utilising domain fronting to evade deep packet inspection
titaniumnetwork-dev / UltravioletA sophisticated proxy used for evading internet censorship or accessing websites in a controlled sandbox using the power of service-workers. Succeeded by Scramjet.
RoseSecurity / Anti Virus Evading PayloadsDuring the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus software when creating backdoors!
SixGenInc / NoctilucentUsing TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
deepinstinct / Dirty VanityA POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
bats3c / Ghost In The LogsEvade sysmon and windows event logging
Idov31 / CronosPoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
knight0x07 / ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
mdsecactivebreach / ChameleonChameleon: A tool for evading Proxy categorisation
nfriedly / Node UnblockerWeb proxy for evading internet censorship, and general-purpose Node.js library for proxying and rewriting remote webpages
machine1337 / Gmailc2A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
boku7 / SpawnCobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.
CheckPointSW / EvasionsEvasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.