Skip to content
View Evi1Grey5's full-sized avatar
🇪🇺
🇪🇺

Block or report Evi1Grey5

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Evi1Grey5/README.md

### Hey!

The official repository of the DSAS by INJECT. Is a team with many years of experience in pentesting and exploit development. Our team has many specialists with different qualification categories. Our team has developed more than 50 large-scale projects for clients to protect their companies that now exist on the world stage. We provide an isolated environment with EDRs for testing your SOFTWARE / CFS - A service for encrypting your files. C2 infrastructure and servers for this infrastructure with maximum OPSEC settings / Software development according to your requests [ all information is available on the official website ]

Static Badge Static Badge Static Badge Static Badge

Training Map for 24/25 Years

Screenshot_1


Here is a list of our Service DSAS by INJECT:

Service Environment to test
Environment EDRs - Environment to test your software
CFS - File Encryption Service
BYPASS EDRs - Bypass EDR / XDR
EXPLOITs - Exploits create team DSAS by INJECT
OPSEC - Сustomization of hidden C2 / SERVERs
ANONYMOUS VPS - Anonymous VPS
EV / OV CERTIFICATES - EV / OV CERTIFICATES
Training - Training DSAS by INJECT TEAM
SoftWARE - Software C2 / LOADER / VPN TOOLS / DROPPER etc
• 🆕 We offer an isolated test environment with real EDR solutions (CrowdStrike, Carbon Black, SentinelOne, PaloAlto) in the near future, we will expand the choice of edr. A customized test environment with maximum isolation from the main network, recreating the EDR policies used in the target environment, and enabling detailed logging in the EDR for analysis. We will release a sequel later. (CrowdStrike, Carbon Black, SentinelOne, Sophos Intercept X, Trend Micro Apex One)
•✅ Fast deployment of the server with the selected EDR and the choice of its configurations / Without loads / Constant support. In your personal account, you can select one or more EDR solutions, rapid deployment, self-configuration of server configurations, EDR edit policy settings and functions [for isolated test environments]. If you plan for the cloud panel to be turned off ? there will be no updates [You receive updates on request.] many EDRS without connection to the panel in the cloud do not work or work only limited. These EDR solutions are selected for local use to simplify your testing.
•✅ We currently offer a cloud-based solution with EDR, available to us as a 2-week trial / isolated test environment for 1 month [from the date of receiving updates on request].
•✅ Important If you plan to test your software on an EDR system, it is important to keep in mind that a local installation may require additional management and maintenance efforts to ensure maximum testing performance of your software.

**>_**WE are glad to welcome everyone who wants to join our community, who want to share something interesting and new. and just those who would like to test our service and become part of our small team, we are always happy to welcome you CONTACT

Popular repositories Loading

  1. MacOS-S MacOS-S Public

    MacOS S

    Objective-C 125 65

  2. Recursive-Loader Recursive-Loader Public

    Recursive Loader

    102 16

  3. Bypass-Smartscreen- Bypass-Smartscreen- Public

    Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode

    C 53 15

  4. Evilginx-3-PHISHLET-LAB Evilginx-3-PHISHLET-LAB Public

    Evilginx 3 [PHISHLET] LAB by Evi1Grey5 [ CUSTOM CREATION / FREE / DEVELOPMENT / LABORATORY ]

    17 10

  5. Shellcode-Loader Shellcode-Loader Public

    Bypass EDR/AV [LOADER] ShellCode

    C# 7 2

  6. Loader Loader Public

    The most common techniques to this day are RunPE and LoadPE 👨‍💻

    C 6 1