efchatz/bypassing-av-detection

Bypassing antivirus detection: old-school malware, new tricks

38
/ 100
Emerging

This project provides methods and code examples to create malicious executables capable of evading detection by common antivirus (AV) solutions, especially on Windows 11. It takes shellcode or binary files as input and, through various encryption and loading techniques, produces an executable (.exe) file. Security researchers, red teamers, and penetration testers would use this to test and demonstrate AV evasion capabilities.

No commits in the last 6 months.

Use this if you are a security professional needing to assess the effectiveness of antivirus and EDR solutions against modern evasion techniques.

Not ideal if you are looking for a simple, pre-built tool for one-click malware generation without delving into the underlying code and compilation processes.

red-teaming penetration-testing malware-analysis antivirus-evasion threat-emulation
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 8 / 25
Maturity 16 / 25
Community 14 / 25

How are scores calculated?

Stars

67

Forks

9

Language

C++

License

MIT

Last pushed

May 10, 2023

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/efchatz/bypassing-av-detection"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.