From 7c2a99c21948aeae9f614897c8ec45f7f8e7bda2 Mon Sep 17 00:00:00 2001 From: Meitar M Date: Thu, 17 Aug 2017 09:16:31 -0400 Subject: [PATCH] Add new section "Defense Evasion Tools" with a bunch of relevant tools. --- README.md | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index a6aadde..b49efbd 100644 --- a/README.md +++ b/README.md @@ -250,6 +250,14 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Veles](https://codisec.com/veles/) - Binary data visualization and analysis tool. * [Hachoir](http://hachoir3.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction. +### Defense Evasion Tools +* [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions. +* [shellsploit](https://github.com/Exploit-install/shellsploit-framework) - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders. +* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encrypter for 32-bit portable executables ("PE `.exe`s"). +* [AntiVirus Evasion Tool (AVET)](https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software. +* [peCloak.py](https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/) - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection. +* [peCloakCapstone](https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool. + ### Hash Cracking Tools * [John the Ripper](http://www.openwall.com/john/) - Fast password cracker. * [Hashcat](http://hashcat.net/hashcat/) - The more fast hash cracker. @@ -320,7 +328,6 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Nipe](https://github.com/GouveaHeitor/nipe) - Script to redirect all traffic from the machine to the Tor network. * [What Every Browser Knows About You](http://webkay.robinlinus.com/) - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks. - ### Reverse Engineering Tools * [Interactive Disassembler (IDA Pro)](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml). * [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.