evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
-
Updated
Dec 21, 2023 - Pascal
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
HookChain: A new perspective for Bypassing EDR Solutions
Loading BOF & ShellCode without executable permission memory.
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
Evasive Golang Loader
Magical obfuscator, supports obfuscating EXE, BOF, and ShellCode.
Generate DLL Hijacking Payload in batches.
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
PowerShell script to terminate protected processes such as anti-malware and EDRs.
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
An easy-to-use and powerful Macro for Stack Spoofing.
ARP Scanner, a lightweight host-alive detection tool for OPSEC.
Bring Your Own Scripting Interpreter - Custom Shell (PHP)
Just an obfuscation technique in a resource file in 2 possible formats
Add a description, image, and links to the bypass-edr topic page so that developers can more easily learn about it.
To associate your repository with the bypass-edr topic, visit your repo's landing page and select "manage topics."