#

edr-evasion

Xacone/BestEdrOfTheMarket
https://static.github-zh.com/github_avatars/Xacone?size=40
C++ 1.34 k
2 个月前
https://static.github-zh.com/github_avatars/klezVirus?size=40

PoC Implementation of a fully dynamic call stack spoofer

C++ 830
1 年前
https://static.github-zh.com/github_avatars/Accenture?size=40
C# 506
2 年前
https://static.github-zh.com/github_avatars/pard0p?size=40

C++ self-Injecting dropper based on various EDR evasion techniques.

C 390
2 年前
https://static.github-zh.com/github_avatars/f1zm0?size=40
Go 381
2 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40

Threadless Process Injection through entry point hijacking

Rust 349
1 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Rust 345
7 个月前
https://static.github-zh.com/github_avatars/naksyn?size=40

pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory

Python 327
1 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40

Apply a divide and conquer approach to bypass EDRs

Rust 287
2 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.

PowerShell 257
3 年前
https://static.github-zh.com/github_avatars/naksyn?size=40

Generic PE loader for fast prototyping evasion techniques

C 236
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

C 207
2 年前
https://static.github-zh.com/github_avatars/V-i-x-x?size=40

kernel callback removal (Bypassing EDR Detections)

C++ 189
6 个月前
https://static.github-zh.com/github_avatars/oldkingcone?size=40

Evade EDR's the simple way, by not touching any of the API's they hook.

PHP 154
8 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

C 141
2 年前
https://static.github-zh.com/github_avatars/Offensive-Panda?size=40

This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...

C++ 132
4 个月前
https://static.github-zh.com/github_avatars/voidvxvt?size=40

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

C 121
9 个月前
loading...
Website
Wikipedia