Loading...
「ツール」は右上に移動しました。
利用したサーバー: watawata8
11いいね 430回再生

EDR bypass - throwback using direct syscalls with AES encryption

Rediscovering my old playlist brought back memories of one of my favorite exploits—bypassing EDR solutions. This dates back to almost three years ago when bypassing EDRs was (and still is) my forte.

I recall crafting a VB.NET-based executable that leveraged encrypted syscalls (secured with AES-256). The magic happened during runtime—AES keys decrypted these syscalls only when interacting with native Windows APIs or sysinternals, ensuring stealth and precision.

Enjoy the fusion of hacking nostalgia and your playlist vibes!

#edr #edrbypass #malware #Metasploit #processinjection #syscalls #sysinternals

コメント