└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Doge-Defense-Evasion-Ref 2 | 3 | - Defense Evasion | Bypass AntiVirus Reference 4 | 5 | ## Github Repositories 6 | 7 | https://github.com/BishopFox/sliver 8 | 9 | https://github.com/optiv/ScareCrow 10 | 11 | https://github.com/Arvanaghi/CheckPlease 12 | 13 | https://github.com/C-Sto/BananaPhone 14 | 15 | https://github.com/EgeBalci/sgn 16 | 17 | https://github.com/Tylous/Limelighter 18 | 19 | https://github.com/josephspurrier/goversioninfo 20 | 21 | https://github.com/lesnuages/go-execute-assembly 22 | 23 | https://github.com/go-bindata/go-bindata 24 | 25 | https://github.com/mattn/go-ieproxy 26 | 27 | https://github.com/secfurry/OwOwningTheWinAPI 28 | 29 | https://github.com/sh4hin/GoPurple 30 | 31 | https://github.com/EddieIvan01/gld 32 | 33 | https://github.com/zaneGittins/go-inject 34 | 35 | https://github.com/Ne0nd0g/go-shellcode 36 | 37 | https://github.com/D00MFist/Go4aRun 38 | 39 | https://github.com/knownsec/shellcodeloader 40 | 41 | https://github.com/am0nsec/HellsGate 42 | 43 | https://github.com/fireeye/sunburst_countermeasures 44 | 45 | https://github.com/mjwhitta/win 46 | 47 | https://github.com/monoxgas/sRDI 48 | 49 | https://github.com/mjwhitta/runsc 50 | 51 | 52 | 53 | ## Articles 54 | 55 | https://www.ired.team/offensive-security/defense-evasion/how-to-unhook-a-dll-using-c++ 56 | 57 | https://paper.seebug.org/1413/ 58 | 59 | https://www.optiv.com/explore-optiv-insights/source-zero/endpoint-detection-and-response-how-hackers-have-evolved 60 | 61 | https://www.optiv.com/explore-optiv-insights/source-zero/edr-and-blending-how-attackers-avoid-getting-caught 62 | 63 | https://www.optiv.com/explore-optiv-insights/blog/escape-and-evasion-egressing-restricted-networks-part-2 64 | 65 | https://www.optiv.com/explore-optiv-insights/blog/escape-and-evasion-egressing-restricted-networks 66 | 67 | https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/ 68 | 69 | https://blog.xpnsec.com/protecting-your-malware/ 70 | 71 | https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/ 72 | 73 | https://blogs.blackberry.com/en/2017/02/universal-unhooking-blinding-security-software 74 | 75 | 76 | 77 | https://labs.jumpsec.com/bypassing-antivirus-with-golang-gopher-it/ 78 | 79 | https://www.deepinstinct.com/2019/09/15/malware-evasion-techniques-part-1-process-injection-and-manipulation/ 80 | 81 | https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/ 82 | 83 | https://www.deepinstinct.com/2019/11/24/malware-evasion-techniques-part-3-anti-sandboxing/ 84 | 85 | https://www.deepinstinct.com/2020/01/12/malware-evasion-techniques-part-4-living-off-the-land/ 86 | 87 | https://awakesecurity.com/blog/threat-hunting-series-detecting-command-control-in-the-cloud/ 88 | 89 | https://awakesecurity.com/blog/threat-detection-all-these-silver-bullets-none-of-them-functional/ 90 | 91 | https://labs.f-secure.com/archive/add-in-opportunities-for-office-persistence/ 92 | 93 | https://sevrosecurity.com/2020/10/14/alaris-a-protective-loader/ 94 | 95 | https://offs3cg33k.medium.com/antivirus-evasion-bypass-techniques-b547cc51c371 96 | 97 | ## πŸš€Star Trend 98 | [![Stargazers over time](https://starchart.cc/timwhitez/Doge-Defense-Evasion-Ref.svg)](https://starchart.cc/timwhitez/Doge-Defense-Evasion-Ref) 99 | --------------------------------------------------------------------------------