edr-bypass
Here are 13 public repositories matching this topic...
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
-
Updated
Jan 19, 2024 - C
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
-
Updated
Jun 6, 2024 - C
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
-
Updated
Jan 20, 2024 - C
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
-
Updated
May 6, 2023 - C
silence file system monitoring components by hooking their minifilters
-
Updated
Jan 31, 2024 - C
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service path, etc. The payload itself can be remotely hosted, downloaded via the wininet library and then executed via direct system calls.
-
Updated
May 8, 2023 - C
Hidedump:a lsassdump tools that may bypass EDR
-
Updated
May 23, 2024 - C
PoC arbitrary WPM without a process handle
-
Updated
Jul 22, 2023 - C
NTAPI hook bypass with (semi) legit stack trace
-
Updated
May 9, 2023 - C
Indirect Syscall invocation via thread hijacking
-
Updated
May 5, 2023 - C
Custom binary file packer/encoder with integrated decoder stub. A pentest-tool for modern EDR evasion.
-
Updated
Nov 9, 2023 - C
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.
-
Updated
Jan 24, 2024 - C
Improve this page
Add a description, image, and links to the edr-bypass topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the edr-bypass topic, visit your repo's landing page and select "manage topics."