evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
-
Updated
Dec 21, 2023 - Pascal
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
HookChain: A new perspective for Bypassing EDR Solutions
Loading BOF & ShellCode without executable permission memory.
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
Evasive Golang Loader
Generate DLL Hijacking Payload in batches.
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
PowerShell script to terminate protected processes such as anti-malware and EDRs.
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.
Add a description, image, and links to the bypass-edr topic page so that developers can more easily learn about it.
To associate your repository with the bypass-edr topic, visit your repo's landing page and select "manage topics."