GitHub / Malforge-Maldev-Public-Organization / Bypass-Windows-Defender-Static-Detection
This repository demonstrates basic static detection evasion techniques for Windows Defender. It includes code to inject an XOR-encrypted reverse shell payload into a remote process using common Windows API calls. The payload is stored in the .rsrc section and decrypted at runtime.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Malforge-Maldev-Public-Organization%2FBypass-Windows-Defender-Static-Detection
PURL: pkg:github/Malforge-Maldev-Public-Organization/Bypass-Windows-Defender-Static-Detection
Stars: 0
Forks: 0
Open issues: 0
License: None
Language: C++
Size: 16.6 KB
Dependencies parsed at: Pending
Created at: 2 months ago
Updated at: 2 months ago
Pushed at: 2 months ago
Last synced at: about 1 month ago
Topics: malware-research, redteaming, windowsdefenderbypass