๐Ÿ”ฎ
Book of Spells
search
โŒ˜Ctrlk
๐Ÿ”ฎ
Book of Spells
  • ๐Ÿ•ฏ๏ธREADME
  • ๐Ÿ“ŸPENTEST
    • WI-FI
    • INFRA
    • PERIMETER
    • WEB
    • PRIVESC
    • PERSIST
    • PIVOTING
    • MOBILE
  • ๐Ÿ’€RED TEAM
    • AV / EDR Evasion
      • Powershell
      • Generate shellcode from Go bins
      • Firewall
      • .NET Execute Assembly
      • Defender
      • VMProtect + Res spoof
      • EDR bypass
      • AMSI
      • Logs
    • Maldev
    • C2
    • Living of the land
  • ๐Ÿ“œADMINISTRATION
    • Kafka
    • Powershell
    • DATABASES
    • Linux
    • Gitlab
    • Docker
    • BashWars
    • Certs
    • Networks
    • MONITORING
    • KUBER
    • CTFd
    • Windows
  • circle-dollarweb3
    • Solidity
    • Smart contracts vulnerabilities
    • Blockchain
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ๐Ÿ’€RED TEAMchevron-right
  2. AV / EDR Evasion

EDR bypass

Direct syscalls:

LogoGitHub - ymmfty0/PESyscallGitHubchevron-right

Syscall numbersarrow-up-right

Some methods:

https://pre.empt.blog/2023/maelstrom-5-edr-kernel-callbacks-hooks-and-call-stacksarrow-up-right

PreviousVMProtect + Res spoofchevron-leftNextAMSIchevron-right

Last updated 7 days ago