GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub
集合主题趋势排行榜
#

edr-evasion

Website
Wikipedia
Xacone/BestEdrOfTheMarket
https://static.github-zh.com/github_avatars/Xacone?size=40
Xacone / BestEdrOfTheMarket

EDR Lab for Experimentation Purposes

edrdefense-evasionedr-evasionedr-testingkernel-driver
C++ 1.34 k
2 个月前
https://static.github-zh.com/github_avatars/klezVirus?size=40
klezVirus / SilentMoonwalk

PoC Implementation of a fully dynamic call stack spoofer

av-evasionedr-evasionthread-stackstack-spoofing
C++ 830
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DEFCON-31-Syscalls-Workshop

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-developmentwindows-internalsdirect-syscallsindirect-syscallsmalware-analysismalware-development-guideworkshopshellcode-loadersyscallsShell
C 695
4 个月前
https://static.github-zh.com/github_avatars/Accenture?size=40
Accenture / Codecepticon

.NET/PowerShell/VBA Offensive Security Obfuscator

antivirus-evasionC#edr-evasionobfuscationPowerShellVBAaccenture-security
C# 506
2 年前
https://static.github-zh.com/github_avatars/pard0p?size=40
pard0p / CallstackSpoofingPOC

C++ self-Injecting dropper based on various EDR evasion techniques.

av-evasiondropperedr-evasionindirect-syscall
C 391
2 年前
https://static.github-zh.com/github_avatars/f1zm0?size=40
f1zm0 / hades

Go shellcode loader that combines multiple evasion techniques

av-evasionedr-evasionGopentestingred-teamingntdllsyscallsevasionadversary-emulationoffensive-security
Go 381
2 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / EPI

Threadless Process Injection through entry point hijacking

HackingredteamRustWindowsedr-evasion
Rust 349
1 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / Unwinder

Call stack spoofing for Rust

edr-evasionhacking-toolRust
Rust 346
7 个月前
https://static.github-zh.com/github_avatars/f1zm0?size=40
f1zm0 / acheron

indirect syscalls for AV/EDR evasion in Go assembly

evasionadversary-emulationav-evasionedr-bypassedr-evasionmalware-researchoffensive-securityred-teamred-teamingAssemblyGo
Assembly 338
2 年前
https://static.github-zh.com/github_avatars/naksyn?size=40
naksyn / PythonMemoryModule

pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory

edr-evasionevasionHackingmemory-modulememorymodulePythonredteamredteam-toolsredteamingrunpe
Python 328
1 年前
https://static.github-zh.com/github_avatars/Kudaes?size=40
Kudaes / Split

Apply a divide and conquer approach to bypass EDRs

edr-evasionforkRustWindows
Rust 287
2 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Payload-Download-Cradles

This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.

antivirus-evasionedr-evasionbypass-antivirusbypass-edrpayload
PowerShell 257
3 年前
https://static.github-zh.com/github_avatars/naksyn?size=40
naksyn / DojoLoader

Generic PE loader for fast prototyping evasion techniques

cobalt-strikeedr-evasionevasionpe-loaderred-team-toolsred-teaming
C 235
1 年前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-vs-Indirect-Syscalls

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasionindirect-syscallsshellcode-loader
C 208
2 年前
https://static.github-zh.com/github_avatars/V-i-x-x?size=40
V-i-x-x / kernel-callback-removal

kernel callback removal (Bypassing EDR Detections)

edredr-bypassedr-evasionKernel
C++ 190
6 个月前
https://static.github-zh.com/github_avatars/oldkingcone?size=40
oldkingcone / BYOSI

Evade EDR's the simple way, by not touching any of the API's they hook.

edr-bypassedr-evasionPHPPowerShellredteam
PHP 154
8 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-A-journey-from-high-to-low

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C 141
2 年前
https://static.github-zh.com/github_avatars/Offensive-Panda?size=40
Offensive-Panda / DefenseEvasionTechniques

This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...

cyber-threat-intelligenceedr-evasionmalware-developmentmalware-researchoffensivesecurity
C++ 131
4 个月前
https://static.github-zh.com/github_avatars/x42en?size=40
x42en / sysplant

Your syscall factory

code-generationhacking-toolsyscallsWindowsedr-evasionoffensive-security
Nim 124
3 个月前
https://static.github-zh.com/github_avatars/j3h4ck?size=40
j3h4ck / WatchDogKiller

PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.

av-bypassav-evasionbyovdedredr-bypassedr-evasion
C++ 123
8 天前
loading...