Automated DLL Sideloading Tool With EDR Evasion Capabilities
-
Updated
Dec 19, 2023 - Python
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over time.
PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
Overwrite ntdll.dll's ".text" section to bypass API hooking. Getting the clean dll from disk, Knowndlls folder or a debugged process
A powerful local AI-agentic tool that generates and validates advanced exploit payloads using CrewAI framework.
A simple tool to automate the testing of EDR bypass techniques using PowerShell commands. It generates an interactive HTML report and displays Window Defender logs.
A Python-based tool for studying and practicing Windows PE binary obfuscation techniques.
Add a description, image, and links to the edr-bypass topic page so that developers can more easily learn about it.
To associate your repository with the edr-bypass topic, visit your repo's landing page and select "manage topics."