An open API service indexing awesome lists of open source software.

Projects in Awesome Lists tagged with defender-bypass

A curated list of projects in awesome lists tagged with defender-bypass .

https://github.com/cyb3rmx/blackheart

BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender restrictions. (FOR EDUCATIONAL PURPOSES!!)

defender-bypass redteam-tools redteaming reverse-shell

Last synced: 21 Nov 2024

https://github.com/gunzf0x/bypassamsi_psrevshell

Simple obfuscated PowerShell revshell generator to bypass AMSI / Windows Defender

amsi-bypass defender-bypass obfuscate obfuscation pentesting powershell python python3 red-team red-teaming reverse-shell revshell

Last synced: 05 Apr 2025

https://github.com/malwarekid/nim-backdoor

The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersky.

backdoor bitdefender bypass bypass-antivirus bypass-defender defender-bypass kaspersky nim nim-lang python python3 windows

Last synced: 23 Mar 2025

https://github.com/shadesofdeath/slapdefender

SlapDefender is a powerful program written in C# .NET language that enables you to enable or disable Windows Defender.

defender defender-bypass defender-disabler defender-kill windows windows-defender windowsdefender

Last synced: 17 Feb 2025

https://github.com/kartiean/exe-to-base64-shellcode-convert

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

antivirus-bypass assembly-changer crypter defender-bypass downloader encryption fud hidden hidden-statup malware malware-builder memory-exclusion mutex rat shellcode trojan trojan-builder trojan-client uac-bypass

Last synced: 09 Apr 2025

https://github.com/kartiean/phantom-dropper-webbased-chrome-bypass-fud-runtime-native

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

antivirus-bypass assembly-changer crypter defender-bypass downloader encryption fud hidden hidden-statup malware malware-builder memory-exclusion mutex rat shellcode trojan trojan-builder trojan-client uac-bypass

Last synced: 09 Apr 2025

https://github.com/kartiean/exe-uacbypass-downloader-crypter-fud-defender-malware-executable

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

antivirus-bypass assembly-changer crypter defender-bypass downloader encryption fud hidden hidden-statup malware malware-builder memory-exclusion mutex rat shellcode trojan trojan-builder trojan-client uac-bypass

Last synced: 09 Apr 2025

https://github.com/kartiean/exe-to-batch-convert

RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.

antivirus-bypass assembly-changer crypter defender-bypass downloader encryption fud hidden hidden-statup malware malware-builder memory-exclusion mutex rat shellcode trojan trojan-builder trojan-client uac-bypass

Last synced: 09 Apr 2025