GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub
集合主题趋势排行榜
#

edr-evasion

Website
Wikipedia
Xacone/BestEdrOfTheMarket
https://static.github-zh.com/github_avatars/Xacone?size=40
Xacone / BestEdrOfTheMarket

EDR Lab for Experimentation Purposes

edrdefense-evasionedr-evasionedr-testingkernel-driver
C++ 1.29 k
10 小时前
https://static.github-zh.com/github_avatars/klezVirus?size=40
klezVirus / SilentMoonwalk

PoC Implementation of a fully dynamic call stack spoofer

av-evasionedr-evasionthread-stackstack-spoofing
C++ 798
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DEFCON-31-Syscalls-Workshop

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-developmentwindows-internalsdirect-syscallsindirect-syscallsmalware-analysismalware-development-guideworkshopshellcode-loadersyscallsShell
C 673
1 个月前
https://static.github-zh.com/github_avatars/Accenture?size=40
Accenture / Codecepticon

.NET/PowerShell/VBA Offensive Security Obfuscator

antivirus-evasionC#edr-evasionobfuscationPowerShellVBAaccenture-security
C# 504
1 年前
https://static.github-zh.com/github_avatars/pard0p?size=40
pard0p / CallstackSpoofingPOC

C++ self-Injecting dropper based on various EDR evasion techniques.

av-evasiondropperedr-evasionindirect-syscall
C 385
1 年前
https://static.github-zh.com/github_avatars/f1zm0?size=40
f1zm0 / hades

Go shellcode loader that combines multiple evasion techniques

av-evasionedr-evasionGopentestingred-teamingntdllsyscallsevasionadversary-emulationoffensive-security
Go 372
2 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / EPI

Threadless Process Injection through entry point hijacking

HackingredteamRustWindowsedr-evasion
Rust 347
10 个月前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / Unwinder

Call stack spoofing for Rust

edr-evasionhacking-toolRust
Rust 335
5 个月前
https://static.github-zh.com/github_avatars/f1zm0?size=40
f1zm0 / acheron

indirect syscalls for AV/EDR evasion in Go assembly

evasionadversary-emulationav-evasionedr-bypassedr-evasionmalware-researchoffensive-securityred-teamred-teamingAssemblyGo
Assembly 332
2 年前
https://static.github-zh.com/github_avatars/naksyn?size=40
naksyn / PythonMemoryModule

pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory

edr-evasionevasionHackingmemory-modulememorymodulePythonredteamredteam-toolsredteamingrunpe
Python 322
1 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / Split

Apply a divide and conquer approach to bypass EDRs

edr-evasionforkRustWindows
Rust 280
2 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Payload-Download-Cradles

This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.

antivirus-evasionedr-evasionbypass-antivirusbypass-edrpayload
PowerShell 256
3 年前
https://static.github-zh.com/github_avatars/naksyn?size=40
naksyn / DojoLoader

Generic PE loader for fast prototyping evasion techniques

cobalt-strikeedr-evasionevasionpe-loaderred-team-toolsred-teaming
C 234
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-vs-Indirect-Syscalls

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasionindirect-syscallsshellcode-loader
C 197
1 年前
https://static.github-zh.com/github_avatars/V-i-x-x?size=40
V-i-x-x / kernel-callback-removal

kernel callback removal (Bypassing EDR Detections)

edredr-bypassedr-evasionKernel
C++ 177
4 个月前
https://static.github-zh.com/github_avatars/oldkingcone?size=40
oldkingcone / BYOSI

Evade EDR's the simple way, by not touching any of the API's they hook.

edr-bypassedr-evasionPHPPowerShellredteam
PHP 148
5 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-A-journey-from-high-to-low

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C 133
2 年前
https://static.github-zh.com/github_avatars/x42en?size=40
x42en / sysplant

Your syscall factory

code-generationhacking-toolsyscallsWindowsedr-evasionoffensive-security
Nim 123
18 天前
https://static.github-zh.com/github_avatars/naksyn?size=40
naksyn / Embedder

Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies

edr-evasionembeddingpyramidredteaming
C++ 120
1 年前
https://static.github-zh.com/github_avatars/Offensive-Panda?size=40
Offensive-Panda / DefenseEvasionTechniques

This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...

cyber-threat-intelligenceedr-evasionmalware-developmentmalware-researchoffensivesecurity
C++ 120
1 个月前
loading...