AV / EDR Evasion

Toy EDRs
Recon
Search for active AV processes on hosts (local admin priveleges required):
Identify Microsoft.NET version from inspecting assembly properties:
Identify Microsoft.NET version from querying the registry:
Windows build <-> default .NET Framework version associations:
1511
4.6.1
1607
4.6.2
1703
4.7
1709
4.7.1
1803
4.7.2
1909+
4.8
.NET Framework version <-> CLR version associations:
2.0, 3.0, 3.5
2
4, 4.5-4.8
4
Potential scan exclusions:
C:\Windows\System32\LogFiles\C:\Windows\System32\inetsrv\C:\Windows\ClusterStorage\C:\ProgramData\Microsoft\Windows\Hyper-V\
Attacking EDRs
Hard-style launch prevention using IFEO:
Hard-style launch prevention using BootExecute:
Hard-style launch prevention using PPL process start:
WFP-Based Prisons
EDRSilencer
EDRPrison
WinDivert
.NET:
Python:
ARP Spoofing + Scapy
Name Resolution Policy Table
Add rule:
Remove rule:
EDR Blindspots
Bring Your Own Interpreter (BYOI)
Python
Pyramid
BOFs with Python
Python RDI
Backdoor Electron Applications (JavaScript)
PE Obfuscation
OLLVM
Install LLVM 13.x obfuscator based on heroims/obfuscator and tpoechtrager/wclang:
TinyCC
String Encryption
Tools
Shellcode Mutation
Tools
PowerShell Tactics
PowerShell Obfuscation
Invoke-Obfuscation
Out-EncryptedScript.ps1
PowerShellArmoury
Tools
msfvenom
Veil-Evasion
Hyperion + Pescramble
GreatSCT
Install and generate a payload:
Exec with msbuild.exe and get a shell:
Ebowla
PEzor
Wrap executable into PEzor:
inceptor
ScareCrow
charlotte
MeterPwrShell
stager_libpeconv
Last updated