There are 9 repositories under edr-evasion topic.
EDR Lab for Experimentation Purposes
PoC Implementation of a fully dynamic call stack spoofer
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
.NET/PowerShell/VBA Offensive Security Obfuscator
C++ self-Injecting dropper based on various EDR evasion techniques.
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
Generic PE loader for fast prototyping evasion techniques
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedicated to improving their skills in malware development, malware research, offensive security, security defenses and measures.
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
Implementation of Indirect Syscall technique to pop a calc.exe
Evade EDR's the simple way, by not touching any of the API's they hook.
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged
BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
Nim process hollowing loader
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service path, etc. The payload itself can be remotely hosted, downloaded via the wininet library and then executed via direct system calls.
Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
A Blind EDR Project for Educational Purposes
Event Tracing for Windows EDR bypass in Rust (usermode)
Unhook Ntdll.dll, Go & C++.
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
(EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.
This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly
PoC arbitrary WPM without a process handle
An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.