Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
-
Updated
Jan 19, 2024 - C
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Bypass Windows Defender with a persistent staged reverse shell using C code & metasploit framework
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.
Simple but effective methods to avoid being detected by antivirus
Add a description, image, and links to the antivirus-bypass topic page so that developers can more easily learn about it.
To associate your repository with the antivirus-bypass topic, visit your repo's landing page and select "manage topics."