✍️
Red Teaming Experiments
Ctrlk
  • What is this iRed.team?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
      • AV Bypass with Metasploit Templates and Custom Binaries
      • Evading Windows Defender with 1 Byte Change
      • Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions
      • Bypassing Cylance and other AVs/EDRs by Unhooking Windows APIs
      • Windows API Hashing in Malware
      • Detecting Hooked Syscalls
      • Calling Syscalls Directly from Visual Studio to Bypass AVs/EDRs
      • Retrieving ntdll Syscall Stubs from Disk at Run-time
      • Full DLL Unhooking with C++
      • Enumerating RWX Protected Memory Regions for Code Injection
      • Disabling Windows Event Logs by Suspending EventLog Service Threads
      • T1027: Obfuscated Powershell Invocations
      • Masquerading Processes in Userland via _PEB
      • Commandline Obfusaction
      • File Smuggling with HTML and JavaScript
      • T1099: Timestomping
      • T1096: Alternate Data Streams
      • T1158: Hidden Files
      • T1140: Encode/Decode Data with Certutil
      • Downloading Files with Certutil
      • T1045: Packed Binaries
      • Unloading Sysmon Driver
      • Bypassing IDS Signatures with Simple Reverse Shells
      • Preventing 3rd Party DLLs from Injecting into your Malware
      • ProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)
      • Parent Process ID (PPID) Spoofing
      • Executing C# Assemblies from Jscript and wscript with DotNetToJscript
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Windows Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page

Was this helpful?

  1. offensive security

Defense Evasion

AV Bypass with Metasploit Templates and Custom BinariesEvading Windows Defender with 1 Byte ChangeBypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon SessionsBypassing Cylance and other AVs/EDRs by Unhooking Windows APIsWindows API Hashing in MalwareDetecting Hooked SyscallsCalling Syscalls Directly from Visual Studio to Bypass AVs/EDRsRetrieving ntdll Syscall Stubs from Disk at Run-timeFull DLL Unhooking with C++Enumerating RWX Protected Memory Regions for Code InjectionDisabling Windows Event Logs by Suspending EventLog Service ThreadsT1027: Obfuscated Powershell InvocationsMasquerading Processes in Userland via _PEBCommandline ObfusactionFile Smuggling with HTML and JavaScriptT1099: TimestompingT1096: Alternate Data StreamsT1158: Hidden FilesT1140: Encode/Decode Data with CertutilDownloading Files with CertutilT1045: Packed BinariesUnloading Sysmon DriverBypassing IDS Signatures with Simple Reverse ShellsPreventing 3rd Party DLLs from Injecting into your MalwareProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)Parent Process ID (PPID) SpoofingExecuting C# Assemblies from Jscript and wscript with DotNetToJscript
PreviousInjecting .NET Assembly to an Unmanaged ProcessNextAV Bypass with Metasploit Templates and Custom Binaries

Last updated 4 years ago

Was this helpful?