X

Bypass-Protection0x00

Information

EDR & AV Bypass Arsenal

**Comprehensive collection of tools, patches, and techniques for evading modern EDR, AV, and other defenses.** All the tools in this repository are a collection that continues to grow, the author's contacts are listed on the inside of each tool if possible. This project is intended for security researchers and students. ## Disclaimer This repository is provided for educational purposes only and intended for authorized security research. Use of these materials in unauthorized or illegal activities is strictly prohibited. ## Functional Specifics - Obfuscation & Polymorphism - AV/EDR Bypass - Windows SmartScreen Bypass - C2 Proxy Relaying - Control-Flow Spoofing - Driver Signature Bypass - EFI/Boot Protection Bypass - PE Infector & Binary Patching - Shellcode Injection & Loaders - APC-Based Code Injection - Shellcode Mutation - Defense Process Termination ## Repository Structure 1️⃣ **Auto-Color** Polymorphic obfuscation toolkit that uses color based encoding to evade static detection. 2️⃣ **BypassAV** Automated framework for disabling or bypassing Windows antivirus engines via API hooking and patching. 3️⃣ **CallstackSpoofingPOC** Proof-of-concept demonstrating call-stack spoofing techniques to defeat Control-Flow Integrity CFI. 4️⃣ **DSC** Driver Signature Check bypass module enabling the loading of unsigned kernel drivers on Windows. 5️⃣ **EfiGuard** Exploit for bypassing UEFI firmware protections and executing unauthorized code during boot. 6️⃣ **ElfDoor-gcc** Linux kernel module loader that injects unsigned ELF objects into kernel space to bypass module signing. 7️⃣ **Hanshell** Shellcode packer/loader with dynamic encryption and anti analysis features. 8️⃣ **PPL-0day** Proof-of-concept exploit targeting Windows Protected Process Light PPL to bypass PPL enforcement. 9️⃣ **Shellcode-Injector** Generic shellcode injection framework supporting reflective injection and process hollowing. 1️⃣0️⃣ **Landrun** Payload loader that leverages custom containerization techniques for stealth execution. 1️⃣1️⃣ **Power-killEDR_AV** Utility to terminate EDR/AV processes by exploiting high privilege system calls. 1️⃣2️⃣ **Zapper** Cleanup tool for erasing logs, disabling tamper protections, and removing forensic traces. 1️⃣3️⃣ **APC-Injection** Leverages Windows Asynchronous Procedure Calls to queue and execute arbitrary code in remote processes for stealthy injection. 1️⃣4️⃣ **Bypass-EDR** Collection of techniques and scripts to disable or evade common Endpoint Detection & Response platforms at runtime. 1️⃣5️⃣ **Bypass-Smartscreen** Implements methods to circumvent Windows SmartScreen application reputation checks and unknown publisher warnings. 1️⃣6️⃣ **Google Script Proxy** Command-and-control proxy using Google Apps Script to relay C2 traffic over Google infrastructure. 1️⃣7️⃣ **PE-infector** Injects custom shellcode or payloads into Portable Executable files, modifying headers and sections for stealthy distribution. 1️⃣8️⃣ **PandaLoader** Payload loader that uses API hooking and reflective techniques to hide code in protected or monitored processes. 1️⃣9️⃣ **Shellcode-Loader** Simple framework for allocating memory, writing shellcode, and invoking it via various injection primitives. 2️⃣0️⃣ **Shellcode-Mutator** Applies polymorphic transformations to raw shellcode encryption, encoding, padding to evade signature-based detection. 2️⃣1️⃣ **el84_injector** ELF injector for Linux: attaches to a running process and maps arbitrary ELF segments into its memory space for execution. 2️⃣2️⃣ **AV\_Clean** Set of scripts and utilities for removing antivirus traces: stops services, deletes files and registry keys, and rolls back changes. 2️⃣3️⃣ **Byte** ZIP-bomb generator that creates ultra compressed archives which expand into huge file sets to exhaust disk space, memory, or CPU resources. 2️⃣4️⃣ **Cryptolib** Common library of cryptographic primitives: encryption, hashing, and obfuscation routines for use in other tools. 2️⃣5️⃣ **Dump** Utility for dumping process and kernel memory including LSASS with support for compression and encryption of the output files. 2️⃣6️⃣ **DVUEFI** Educational platform and PoC suite for analyzing UEFI firmware vulnerabilities, with Secure Boot bypass techniques and integrity-check evasion. 2️⃣7️⃣ **GenEDRBypass** EDR-bypass generator: dynamically produces shellcode via msfvenom, applies XOR obfuscation, and includes anti-debug and anti-sandbox features. 2️⃣8️⃣ **Morpheus** Stealthy in-memory LSASS dumper: compresses memory dumps and exfiltrates them over obfuscated NTP style UDP packets secured with RC4 and error correction. 2️⃣9️⃣ **SecureUxTheme** Patch and loader for disabling signature checks in UxTheme.dll, allowing the installation of unsigned Windows themes. 3️⃣0️⃣ **TripleCross** Code injection framework leveraging COM objects to execute payloads in protected processes without direct API calls. 3️⃣1️⃣ **UEFISecureBoot** Scripts and PoCs for bypassing or disabling UEFI Secure Boot by chain-loading unsigned bootloaders and modifying firmware variables. 3️⃣2️⃣ **Vulnerable** Collection of intentionally vulnerable applications, drivers, and firmware images for practicing and demonstrating bypass techniques. 3️⃣3️⃣ **elf-infector** Linux ELF binary infector that injects custom shellcode into existing executables by modifying headers and segments for stealthy execution. 3️⃣4️⃣ **gnu-efi** Build scripts and headers for creating UEFI applications using GNU EFI, simplifying Secure Boot testing. 3️⃣5️⃣ **injectAmsiBypass** Beacon Object File and standalone module that dynamically patches AMSI in memory to bypass script-scanning defenses. 3️⃣6️⃣ **kernel-callback** Kernel mode injection primitive using Routine Callback, executing payloads in kernel context while bypassing user mode hooks. 3️⃣7️⃣ **kernel-hardening-checker** Windows PatchGuard auditor that inspects driver-signature settings and reports potential bypass attack vectors. 3️⃣8️⃣ **lib** Shared libraries and utilities for process management, injection primitives, and obfuscation methods used across multiple tools. 3️⃣9️⃣ **mcuboot** Reference bootloader for microcontrollers with firmware-signature verification and chain of trust support for embedded systems. 4️⃣0️⃣ **phnt** Header only collection of Windows NT API definitions and internal structures for low level system programming. 4️⃣1️⃣ **redlotus** Advanced in-memory loader with reflective loading and encrypted payload delivery to evade analysis. 4️⃣2️⃣ **rootkit** Kernel mode rootkit framework for hiding processes, inline hooking, and bypassing Event Tracing for Windows ETW on modern systems. 4️⃣3️⃣ **scripts** Helper scripts for building, deploying, and automating tools: compilation helpers and test C2 harnesses. 4️⃣4️⃣ **shim** Custom shim-DLL and loader mechanism to intercept application launches, patch imports, and bypass AppLocker/SmartScreen. 4️⃣5️⃣ **Nimbus** Contains a C# reflective-loader for .NET assemblies EXE/DLL that loads and immediately executes .NET applications in memory without creating temporary files on disk. 4️⃣6️⃣ **Shellcode-Hide** Set of tools for preparing and covertly executing shellcode on Windows, including loaders, encoders and encryptors 4️⃣7️⃣ **Safari 1day RCE Exploit** Exploit RCE vulnerability in WebKit/Safari running on certain versions of iOS and macOS. 4️⃣8️⃣ **ReverseSocks5** Tool for organizing a reverse SOCKS5 proxy. 4️⃣9️⃣ **tsh-master** Backdoor for Unix-like systems. 5️⃣0️⃣ **Hunt-Sleeping-Beacons** Callstack scanner which tries to identify IOCs indicating an unpacked or injected C2 agent. 5️⃣1️⃣ **BitlockMove** Lateral Movement via Bitlocker DCOM & COM Hijacking, PoC for Lateral Movement abuses the fact, that some COM Classes configured as INTERACTIVE USER will spawn a process in the context of the currently logged on users session. 5️⃣2️⃣ **WatchDogKiller** PoC accompanying technical write-up on the WatchDog Anti-Malware amsdk.sys BYOVD vulnerability.

Prompts

Reviews

Tags

Write Your Review

Detailed Ratings

ALL
Correctness
Helpfulness
Interesting
Upload Pictures and Videos

Name
Size
Type
Download
Last Modified
  • Community

Add Discussion

Upload Pictures and Videos