From c5208dbb017d01a162af51bb98804164dfbc2e7d Mon Sep 17 00:00:00 2001 From: Meitar M Date: Thu, 29 Aug 2019 14:56:11 -0400 Subject: [PATCH] Add CarbonCopy code signing spoofer tool used for AV evasion. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 7e4619d..af10d4a 100644 --- a/README.md +++ b/README.md @@ -83,6 +83,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea ## Anti-virus Evasion Tools * [AntiVirus Evasion Tool (AVET)](https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software. +* [CarbonCopy](https://github.com/paranoidninja/CarbonCopy) - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion. * [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE `.exe`s"). * [Shellter](https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. * [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.