Skip to content
#

defense-evasion

Here are 18 public repositories matching this topic...

Go offensive-security research library — 15+ injection methods, AMSI/ETW/ntdll-unhook evasion, sleep mask (Ekko × XOR/RC4/AES), call-stack spoof, BYOVD (RTCore64) + kernel callback removal, LSASS dump + pure-Go MSV1_0 parser w/ PPL bypass, recon (sandbox/VM/debugger/dllhijack), PE ops (sRDI/BOF/CLR), Meterpreter C2, UAC bypass, CVE-2024-30088 LPE.

  • Updated Apr 27, 2026
  • Go

Complete forensic analysis of a zero-detection infostealer hidden in a pirated Adobe Illustrator 2026 installer (Set-up.exe). Includes full IOCs, MITRE ATT&CK mapping, sandbox behavior, C2 infrastructure, and incident response guidance. Defensive security research only.

  • Updated Apr 25, 2026

Improve this page

Add a description, image, and links to the defense-evasion topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the defense-evasion topic, visit your repo's landing page and select "manage topics."

Learn more