EvasionEDR's repositories
SelectMyParent
PPID Spoofing
EvasionDetect
memory evasion and detect mechanisms
DefenderYara
Extracted Yara rules from Defender mpavbase.vdm and mpasbase
Capstone-Project
This project was for my senior capstone at the University of Arizona. I wanted to create a payload that would potentially bypass AV / EDR products using techniques that negate or circumvent detection techniques used by these products.
SweetDreams
Implementation of Advanced Module Stomping and Heap/Stack Encryption
Learning-EDR-and-EDR_Evasion
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
ContainYourself
A POC of the ContainYourself research presented in DEF CON 31, which abuses the Windows containers framework to bypass EDRs.
YaraCatch
some yara rules for catch your payload which made myself
PageSplit
Splitting and executing shellcode across multiple pages
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
AV-EPP-EDR-Windows-API-Hooking-List
Depending on the AV/EDR we will check which Windows APIs are hooked by the AV/EDR
EntropyReducer
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
hw-call-stack
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
plague
Default Detections for EDR
CallStackMasker
A PoC implementation for dynamically masking call stacks with timers.
ntdlll-unhooking-collection
different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)
Alcatraz
x64 binary obfuscator
.NET-Obfuscator
Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )
PatchThatAMSI
this repo contains 6 AMSI patches , both force the triggering of a conditional jump inside AmsiOpenSession() that close the Amsi scanning session. The 1st patch by corrupting the Amsi context header and the 2nd patch by changing the string "AMSI" that will be compared to the Amsi context header to "D1RK". The other just set ZF to 1.
NoRunPI
Run Your Payload Without Running Your Payload
Janus
Janus is a pre-build event that performs string obfuscation during compile time. This project is based off the CIA's Marble Framework
Obfuscator
A program for obfuscating C strings
c_syscalls
Single stub direct and indirect syscalling with runtime SSN resolving for windows.
ProtectMyTooling
[壳] Multi-Packer allowing to daisy-chain over 29 packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
DllToShellCode
Fast Conversion Windows Dynamic Link Library To ShellCode
EtwTi-Syscall-Hook
A simple program to hook the current process to identify the manual syscall executions on windows