Skip to content
View EvilWhales's full-sized avatar
🐟
barracuda
🐟
barracuda

Block or report EvilWhales

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EvilWhales/README.md

The founder of the platform CFS x RProxy LAB

Multilingual developer x Reverse Engineering x Reverse Proxy Developer crafting fast, reliable, and secure network solutions.

CFS LAB xCommunity Community: An elite center for Red Teams and Pentesters

We decided to deploy a server with a dedicated DISCORD membership. Join the exclusive community where Red Teams representatives share tools to circumvent the protection. The subscription opens up a whole arsenal of opportunities to bypass AV, EDR, XDR and other barriers, from file encryption to reliable C2 platforms.

What is included in the subscription :

CFS - KILL AV/EDR Cryptor is our proprietary tool for obfuscation and encryption of payloads and your Malware. Bypasses the best antiviruses (Kaspersky, Defender, CrowdStrike), EDR (SentinelOne, Carbon Black, e.t.c.) and XDR. Supports polymorphic generation, debugging protection, and memory analysis. Full integration with Cobalt Strike, Nighthawk and other applications.

C2 and RAT Tools: Full versions of Cobalt Strike, Nighthawk, Brute Ratel C4 (BRc4) and similar —stealth C2, EDR/AV evasion, post-exploitation and durability. Ready-made profiles for Mimikatz, BOF, and custom payloads.

Resources for circumvention: obfuscation methods, manipulation of executable files (Mangle, RedGuard), bypassing the memory scanner. SourcePoint (CS) and AzureC2Relay manuals.

Certificates and signatures: Instructions for obtaining EV code signing certificates — legally and anonymously — for signing malware without checkboxes.

Red Team Ops: Attack schemes, advertising usage modules (BloodHound, Hashcat), network intelligence (Nmap). Training courses on malware development, BOF, cloud threat prevention, and other materials.

xCommunity: chat with red team experts, joint simulations, tool updates. Unlimited — created for real pentests.
Membership Discord

👋 TOX: 340EF1DCEEC5B395B9B45963F945C00238ADDEAC87C117F64F46206911474C61981D96420B72

💡 Making networks faster than you can say "proxy"!

Pinned Loading

  1. RProxy-LAB RProxy-LAB Public

    RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools

    C 40 11

  2. BypassingAVs BypassingAVs Public

    Bypassing AVs and Sandboxes

    C++ 18 1

  3. CobaltStrike-Beacon-SRC CobaltStrike-Beacon-SRC Public

    Beacon src from Cobalt Strike, ready to use immediately after installation.

    4

  4. ShadowDropper ShadowDropper Public

    ShadowDropper is a utility for covertly delivering and executing payloads on a target system.

    C 24 7

  5. BarracudaMailer BarracudaMailer Public

    The best solution against spam Barracuda Mailer/

    JavaScript 5

  6. Cobalt-Strike-Ultimate-Arsenal Cobalt-Strike-Ultimate-Arsenal Public

    Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and penetration testing

    PowerShell 90 17