Skip to content
View Vdgonc's full-sized avatar
🤖
🤖

Block or report Vdgonc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

🦠AV

12 repositories

Because AV evasion should be easy.

Go 728 71 Updated Nov 28, 2024

Experiment with PAGE_GUARD protection to hide memory from other processes

C 44 8 Updated Jun 24, 2024

Dynamically resolve and invoke Windows APIs using Rust. This might help to avoid suspicious imports and the usage of GetProcAddress.

Rust 8 2 Updated Oct 4, 2022

Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html

C 137 28 Updated May 10, 2022

It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)

Go 508 53 Updated Oct 12, 2022

Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry

C# 411 38 Updated Aug 2, 2024

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 864 98 Updated May 22, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 1,492 159 Updated May 21, 2025

Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techniques

C++ 128 14 Updated May 16, 2025