GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub
集合主题趋势排行榜
#

edr-bypass

Website
Wikipedia
klezVirus/inceptor
https://static.github-zh.com/github_avatars/klezVirus?size=40
klezVirus / inceptor

Template-Driven AV/EDR Evasion Framework

obfuscationpinvokedinvokecode-injectionprocess-injectionav-bypassamsi-bypassav-evasionedr-bypasspe-packeramsi-evasionred-teamred-teamingav-edr-bypasspayload-generator
Assembly 1.69 k
2 年前
https://static.github-zh.com/github_avatars/tkmru?size=40
tkmru / awesome-edr-bypass

Awesome EDR Bypass Resources For Ethical Hacking

Awesome Listsedredr-bypassredteamredteaming
1.21 k
10 天前
https://static.github-zh.com/github_avatars/NUL0x4C?size=40
NUL0x4C / AtomPePacker

A Highly capable Pe Packer

edr-bypasspackerpe
C 703
3 年前
https://static.github-zh.com/github_avatars/thomasxm?size=40
thomasxm / BOAZ_beta

Multilayered AV/EDR Evasion Framework

boazcode-injectionobfuscationav-bypassav-edr-bypassav-evasionedr-bypassetw-bypasspayload-generatorpe-packerprocess-injectionred-teamingred-teaming-toolsred-reamantivirus-evasion
C++ 683
1 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DEFCON-31-Syscalls-Workshop

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-developmentwindows-internalsdirect-syscallsindirect-syscallsmalware-analysismalware-development-guideworkshopshellcode-loadersyscallsShell
C 666
24 天前
https://static.github-zh.com/github_avatars/georgesotiriadis?size=40
georgesotiriadis / Chimera

Automated DLL Sideloading Tool With EDR Evasion Capabilities

AssemblyC++edr-bypassoffensive-securityPython
Python 477
1 年前
https://static.github-zh.com/github_avatars/WesleyWong420?size=40
WesleyWong420 / RedTeamOps-Havoc-101

Materials for the workshop "Red Team Ops: Havoc 101"

active-directoryav-evasionedr-bypassopsecprocess-injectionred-team-opshavoc
C# 378
8 个月前
https://static.github-zh.com/github_avatars/f1zm0?size=40
f1zm0 / acheron

indirect syscalls for AV/EDR evasion in Go assembly

evasionadversary-emulationav-evasionedr-bypassedr-evasionmalware-researchoffensive-securityred-teamred-teamingAssemblyGo
Assembly 329
2 年前
https://static.github-zh.com/github_avatars/Offensive-Panda?size=40
Offensive-Panda / RWX_MEMEORY_HUNT_AND_INJECTION_DV

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.

avbypassedr-bypassfudmalware-developmentShell
C++ 285
1 年前
https://static.github-zh.com/github_avatars/V-i-x-x?size=40
V-i-x-x / AMSI-WRITE-RAID-BYPASS

"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS

0dayamsi-bypassamsi-evasionamsi-patchavavbypassedr-bypassvulnerabilitypentestpentestingMalware
PowerShell 284
2 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Create-Thread-Shellcode-Fetcher

This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)...

shellcode-loadershellcode-injectionantivirus-evasionedr-bypassmsfvenombypass-antivirus
C++ 247
2 年前
https://static.github-zh.com/github_avatars/fortra?size=40
fortra / hw-call-stack

Use hardware breakpoints to spoof the call stack for both syscalls and API calls

edr-bypassstack-spoofingsyscalls
C 196
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-vs-Indirect-Syscalls

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasionindirect-syscallsshellcode-loader
C 194
1 年前
https://static.github-zh.com/github_avatars/dobin?size=40
dobin / antnium

A C2 framework for initial access in Go

c2edr-bypassinitial-accessratremote-access
Go 184
3 年前
https://static.github-zh.com/github_avatars/V-i-x-x?size=40
V-i-x-x / kernel-callback-removal

kernel callback removal (Bypassing EDR Detections)

edredr-bypassedr-evasionKernel
C++ 172
3 个月前
https://static.github-zh.com/github_avatars/oldkingcone?size=40
oldkingcone / BYOSI

Evade EDR's the simple way, by not touching any of the API's they hook.

edr-bypassedr-evasionPHPPowerShellredteam
PHP 145
5 个月前
https://static.github-zh.com/github_avatars/mrexodia?size=40
mrexodia / lolbin-poc

Small PoC of using a Microsoft signed executable as a lolbin.

edr-bypassMalwarepocredteamredteam-toolsredteamingwindbgwindbg-extension
C++ 137
2 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-A-journey-from-high-to-low

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C 133
2 年前
https://static.github-zh.com/github_avatars/njcve?size=40
njcve / inflate.py

Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.

antivirusantivirus-evasionav-bypassav-evasionBug Bountyedr-bypassendpoint-securityevasion-attack
Python 120
3 年前
https://static.github-zh.com/github_avatars/voidvxvt?size=40
voidvxvt / HellBunny

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

direct-syscallsedr-evasionindirect-syscallsmalware-developmentmsvcWindowsprocess-injectionedr-bypassdllshellcode-injectionshellcode-loader
C 107
6 个月前
loading...