Defense and Evasion

Tools for evasion

6 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

AntiVirus Evasion Tool (AVET) 

Open-source      

Antivirus evasion tools

Fireprox 

Open-source      

AWS API Gateway management tool for IP rotation

Hyperion 

Free      

Runtime encryptor for 32-bit portable executables ("PE .exes")

peCloak.py 

Free      

Hides malicious Windows executable from antivirus

peCloakCapstone 

Open-source      

Multi-platform fork of peCloak.py

Proxybroker2 

Open-source      

Auto-rotate IP via proxy