Collected molecules will appear here. Add from search or explore.
A curated collection of offensive security techniques and proof-of-concept scripts designed to evade Endpoint Detection and Response (EDR) and Antivirus (AV) systems through methods like API unhooking, direct syscalls, and shellcode obfuscation.
Defensibility
stars
63
forks
19
Bypass-Protection0x00 is a classic 'arsenal' repository common in the red teaming community. While it provides functional code for bypassing security controls, it suffers from the inherent 'cat-and-mouse' nature of offensive security: once a technique is published on GitHub and gains even modest traction (63 stars), it is immediately analyzed by EDR vendors (CrowdStrike, SentinelOne, Microsoft Defender) and signatured or mitigated. The techniques—such as unhooking ntdll or using indirect syscalls—are well-known in the industry and can be found in more established frameworks like Havoc, Sliver, or the Cobalt Strike ecosystem. Its defensibility is low because it lacks a unique architectural moat; it is a collection of existing research. The displacement horizon is very short (6 months) because these specific implementations are likely already being neutralized by automated behavioral analysis. Frontier labs (OpenAI, Anthropic) are unlikely to build this directly due to safety and alignment constraints, though they are developing the underlying LLM capabilities that could generate similar code on demand.
TECH STACK
INTEGRATION
reference_implementation
READINESS