Pinned Repositories
DllToShellCode
Fast Conversion Windows Dynamic Link Library To ShellCode
EchoDrv
Exploitation of echo_driver.sys
EntropyReducer
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
EtwTi-Syscall-Hook
A simple program to hook the current process to identify the manual syscall executions on windows
EvasionDetect
memory evasion and detect mechanisms
hw-call-stack
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
noWatch
Implant drop-in for EDR testing
ObfLoader
MAC, IPv4, UUID shellcode Loaders and Obfuscators to obfuscate the shellcode and using some native API to converts it to it binary format and loads it.
ShellCodeFramework
绕3环的shellcode免杀框架
EvasionEDR's Repositories
EvasionEDR/EvasionDetect
memory evasion and detect mechanisms
EvasionEDR/ObfLoader
MAC, IPv4, UUID shellcode Loaders and Obfuscators to obfuscate the shellcode and using some native API to converts it to it binary format and loads it.
EvasionEDR/EchoDrv
Exploitation of echo_driver.sys
EvasionEDR/noWatch
Implant drop-in for EDR testing
EvasionEDR/DllToShellCode
Fast Conversion Windows Dynamic Link Library To ShellCode
EvasionEDR/EntropyReducer
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
EvasionEDR/EtwTi-Syscall-Hook
A simple program to hook the current process to identify the manual syscall executions on windows
EvasionEDR/hw-call-stack
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
EvasionEDR/Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
EvasionEDR/.NET-Obfuscator
Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )
EvasionEDR/Alcatraz
x64 binary obfuscator
EvasionEDR/AV-EPP-EDR-Windows-API-Hooking-List
Depending on the AV/EDR we will check which Windows APIs are hooked by the AV/EDR
EvasionEDR/c_syscalls
Single stub direct and indirect syscalling with runtime SSN resolving for windows.
EvasionEDR/CallStackMasker
A PoC implementation for dynamically masking call stacks with timers.
EvasionEDR/Capstone-Project
This project was for my senior capstone at the University of Arizona. I wanted to create a payload that would potentially bypass AV / EDR products using techniques that negate or circumvent detection techniques used by these products.
EvasionEDR/ContainYourself
A POC of the ContainYourself research presented in DEF CON 31, which abuses the Windows containers framework to bypass EDRs.
EvasionEDR/DefenderYara
Extracted Yara rules from Defender mpavbase.vdm and mpasbase
EvasionEDR/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
EvasionEDR/Janus
Janus is a pre-build event that performs string obfuscation during compile time. This project is based off the CIA's Marble Framework
EvasionEDR/Learning-EDR-and-EDR_Evasion
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
EvasionEDR/NoRunPI
Run Your Payload Without Running Your Payload
EvasionEDR/ntdlll-unhooking-collection
different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)
EvasionEDR/Obfuscator
A program for obfuscating C strings
EvasionEDR/PageSplit
Splitting and executing shellcode across multiple pages
EvasionEDR/PatchThatAMSI
this repo contains 6 AMSI patches , both force the triggering of a conditional jump inside AmsiOpenSession() that close the Amsi scanning session. The 1st patch by corrupting the Amsi context header and the 2nd patch by changing the string "AMSI" that will be compared to the Amsi context header to "D1RK". The other just set ZF to 1.
EvasionEDR/plague
Default Detections for EDR
EvasionEDR/ProtectMyTooling
[壳] Multi-Packer allowing to daisy-chain over 29 packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
EvasionEDR/SelectMyParent
PPID Spoofing
EvasionEDR/SweetDreams
Implementation of Advanced Module Stomping and Heap/Stack Encryption
EvasionEDR/YaraCatch
some yara rules for catch your payload which made myself