Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
NtDallas authored Dec 29, 2024
1 parent 444882b commit 42f0335
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -59,7 +59,7 @@ ret
Evading ETW is effective, but you might observe strange behavior during execution. If your process loads the CLR and ETW does not receive telemetry, this is not a normal aspect of assembly execution.

- Consideration 2 :
Loading the CLR from a managed process can appear suspicious. You can inject your assembly into a process where the CLR is already loaded.
Loading the CLR from a unmanaged process can appear suspicious. You can inject your assembly into a process where the CLR is already loaded.

- Consideration 3 :
Patching a function is the most reliable way (100% certain) to ensure it will not be called, but it is also the most dangerous method for evading AMSI/ETW.

0 comments on commit 42f0335

Please sign in to comment.