#EDREvasion

2025-12-09

Ransomware gangs are using the Shanya.exe packer to hide EDR-killers — making defenses blind before the attack even begins. Obfuscation is their new edge. 🧩💀 #Ransomware #EDREvasion

bleepingcomputer.com/news/secu

2025-10-27

🚨 EDR-Redir exploit uses Windows’ Bind & Cloud Filter drivers to redirect or isolate EDR folders from user mode - no kernel privileges required.

Demoed by TwoSevenOneT, it breaks Elastic Defend, Sophos, and even disables Defender via CFAPI corruption.

Minifilter abuse is becoming the new weak link in EDR design.

💬 Thoughts on how vendors should adapt?
Follow TechNadu for continuous

#ThreatResearch and #EDREvasion updates.
#InfoSec #CyberSecurity #EDR #BYOVD #WindowsSecurity #MalwareAnalysis #RedTeam

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
2025-06-16

No PE header? No problem.

@FortiGuardLabs dropped a deep dive into a malware sample dumped without a PE header — like a cybercriminal rage-quit halfway through packing their payload.

You ever load a binary in IDA and think, “Am I being punk’d?”
Yeah, it’s one of those samples.

This sample:

  • Reconstructs its own PE structure at runtime

  • Hides config data in obfuscated blobs

  • Uses anti-sandbox tricks to avoid analysis

  • Drops yet another info-stealer, because originality is dead

It’s engineered to break basic static analysis and dodge sandboxes like it’s speedrunning DEFCON CTF.

🔗 Full breakdown:
fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Static AV signatures won’t help here

  • Watch for suspicious memory allocations + hollowing patterns

  • Endpoint heuristics > file-based detection

  • Log your PowerShell and LOLBins — this thing probably brings friends

  • If your EDR cries when it sees raw shellcode, maybe give it a hug

#ThreatIntel #MalwareAnalysis #ReverseEngineering #Infosec #PEFilesAreSo2020 #EDREvasion #LOLbins #CyberSecurity #BlueTeam

kriware :verified:kriware@infosec.exchange
2025-03-15

BestEdrOfTheMarket: Open-Source Lab for EDR Evasion Techniques

BestEdrOfTheMarket is an open-source lab for training and learning EDR evasion techniques, utilizing Windows NT's telemetric capabilities.

github.com/Xacone/BestEdrOfThe

#EDREvasion

2025-02-16

Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs

Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExploits/hid
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/post

Happy hacking! 😀

#Cybersecurity #MalwareDevelopment #Steganography #RedTeam
#EDREvasion #Python #C #Hacking #PayloadHiding #PenetrationTesting

Claus Cramon Houmannclaushoumann
2024-10-23

Here's the wiki entries for as promised @hack_lu @itisiboller

Evadere Classifications - different types of evasions by SpectreOps
Awesome EDR Bypass Resources For Ethical Hacking - Awesome-EDR-bypasses
“in the past two years, Mandiant, which is part of Alphabet Inc.’s Google Cloud division, has investigated 84 breaches where EDR or other endpoint security software was tampered with or disabled bloomberg.com/news/articles/20

acrypthash👨🏻‍💻acrypthash@infosec.exchange
2023-07-17

Happy Monday! This morning I am feeling much more caught up and refreshed. The feeling of burnout and being overwhelmed have subsided which is great!

Today I am going to spending part of the day working with the interns and the other half of the day getting the Github integration working ELK. I was able to get one of my private repos to work properly, now I just need to get our organization's account working.

We are also wrapping up our IR tabletop exercise. I am very proud with how the interns have contributing. We went with an EDR evasion method of compromise on some ERP servers that run our warehouses!

Lot's of other stuff. Maybe I should write another blog post about everything I am working on!

#security #IRtabletop #interns #ELK #github #EDRevasion

Tedi Heriyantotedi@infosec.exchange
2023-07-13

A memory-based evasion technique which makes shellcode invisible from process start to end: github.com/lem0nSec/ShellGhost

#AvEvasion #EdrEvasion #redteam #redteaming #shellcode

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst