Defense Evasion

Here are the articles in this section:
AV Bypass with Metasploit Templates and Custom Binaries
Evading Windows Defender with 1 Byte Change
Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions
Bypassing Cylance and other AVs/EDRs by Unhooking Windows APIs
EDR / AV Evasion
Windows API Hashing in Malware
Detecting Hooked Syscalls
Calling Syscalls Directly from Visual Studio to Bypass AVs/EDRs
Retrieving ntdll Syscall Stubs from Disk at Run-time
Full DLL Unhooking with C++
EDR evasion
Enumerating RWX Protected Memory Regions for Code Injection
Code Injection, Defense Evasion
Disabling Windows Event Logs by Suspending EventLog Service Threads
Obfuscated Powershell Invocations
Defense Evasion
Masquerading Processes in Userland via _PEB
Understanding how malicious binaries can maquerade as any other legitimate Windows binary from the userland.
Commandline Obfusaction
Commandline obfuscation
File Smuggling with HTML and JavaScript
Defense Evasion
Alternate Data Streams
Hidden Files
Defense Evasion, Persistence
Encode/Decode Data with Certutil
Defense Evasion
Downloading Files with Certutil
Downloading additional files to the victim system using native OS binary.
Packed Binaries
Defense Evasion, Code Obfuscation
Unloading Sysmon Driver
Unload sysmon driver which causes the system to stop recording sysmon event logs.
Bypassing IDS Signatures with Simple Reverse Shells
Preventing 3rd Party DLLs from Injecting into your Malware
ProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)
Parent Process ID (PPID) Spoofing
Executing C# Assemblies from Jscript and wscript with DotNetToJscript