An Active Defense and EDR software to empower Blue Teams
-
Updated
Aug 10, 2023 - C++
An Active Defense and EDR software to empower Blue Teams
Little user-mode AV/EDR evasion lab for training & learning purposes
Enumerate and disable common sources of telemetry used by AV/EDR.
Evasive shellcode loader for bypassing event-based injection detection (PoC)
iMonitor(冰镜 - 终端行为分析系统)
This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hollowing
Repository to publish your evasion techniques and contribute to the project
Add a description, image, and links to the edr topic page so that developers can more easily learn about it.
To associate your repository with the edr topic, visit your repo's landing page and select "manage topics."