Red Team Notes
CtrlK
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
      • AV Bypass with Metasploit Templates and Custom Binaries
      • Evading Windows Defender with 1 Byte Change
      • Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions
      • Bypassing Cylance and other AVs/EDRs by Unhooking Windows APIs
      • Windows API Hashing in Malware
      • Detecting Hooked Syscalls
      • Calling Syscalls Directly from Visual Studio to Bypass AVs/EDRs
      • Retrieving ntdll Syscall Stubs from Disk at Run-time
      • Full DLL Unhooking with C++
      • Enumerating RWX Protected Memory Regions for Code Injection
      • Disabling Windows Event Logs by Suspending EventLog Service Threads
      • Obfuscated Powershell Invocations
      • Masquerading Processes in Userland via _PEB
      • Commandline Obfusaction
      • File Smuggling with HTML and JavaScript
      • Timestomping
      • Alternate Data Streams
      • Hidden Files
      • Encode/Decode Data with Certutil
      • Downloading Files with Certutil
      • Packed Binaries
      • Unloading Sysmon Driver
      • Bypassing IDS Signatures with Simple Reverse Shells
      • Preventing 3rd Party DLLs from Injecting into your Malware
      • ProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)
      • Parent Process ID (PPID) Spoofing
      • Executing C# Assemblies from Jscript and wscript with DotNetToJscript
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page
  1. offensive security

Defense Evasion

AV Bypass with Metasploit Templates and Custom BinariesEvading Windows Defender with 1 Byte ChangeBypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon SessionsBypassing Cylance and other AVs/EDRs by Unhooking Windows APIsWindows API Hashing in MalwareDetecting Hooked SyscallsCalling Syscalls Directly from Visual Studio to Bypass AVs/EDRsRetrieving ntdll Syscall Stubs from Disk at Run-timeFull DLL Unhooking with C++Enumerating RWX Protected Memory Regions for Code InjectionDisabling Windows Event Logs by Suspending EventLog Service ThreadsObfuscated Powershell InvocationsMasquerading Processes in Userland via _PEBCommandline ObfusactionFile Smuggling with HTML and JavaScriptTimestompingAlternate Data StreamsHidden FilesEncode/Decode Data with CertutilDownloading Files with CertutilPacked BinariesUnloading Sysmon DriverBypassing IDS Signatures with Simple Reverse ShellsPreventing 3rd Party DLLs from Injecting into your MalwareProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)Parent Process ID (PPID) SpoofingExecuting C# Assemblies from Jscript and wscript with DotNetToJscript
PreviousFormat String BugNextAV Bypass with Metasploit Templates and Custom Binaries