CybersecTools API access is now live!Learn More

Evasion

Browse 30 evasion tools

Deception-based endpoint agent preventing ransomware & malware pre-execution.

Custom hypervisor for stealth malware analysis on VMs and bare metal.

Bundled offensive security suites combining pen testing, red teaming, and VM.

Red team toolkit for EDR evasion, initial access, and post-exploitation.

Post-exploitation threat emulation platform for red team operations.

Ransomware-specific detection tool for rapid identification of extortion attacks

A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.

SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.

A PHP-based command and control framework that maintains persistent web server access through polymorphic backdoors and HTTP header communication tunneling.

A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.

A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.

UDcide is an Android malware analysis tool that detects and removes specific malicious behaviors from malware samples while preserving the binary for investigation purposes.

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.

Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.

RedWarden is a Cobalt Strike C2 reverse proxy that uses packet inspection and malleable profile correlation to evade detection by security controls during red team operations.

RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.

MSBuildAPICaller is an offensive security tool that enables interaction with the MSBuild API to execute arbitrary scripts for red teaming and penetration testing purposes.

Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.