Malware Research / RedTeam / News – Telegram
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.

https://github.com/wavestone-cdt/EDRSandblast/

#tool #redteam #edr #bypass
This is a new bypass technique for memory scanners. It is useful in hiding problematic code that will be flagged by the antivirus vendors.

This is basically an improved version of Voidgate, but without all of the previous limitations.

This technique is compatible with all C2 beacons, it handles multithreaded payloads and it can handle executables generated by tools such as pe_to_shellcode, thus allowing it to run virtually any non .NET executables.

https://github.com/vxCrypt0r/Voidmaw

#tool #redteam #bypass
Ghost is a shellcode loader project designed to bypass multiple detection capabilities that are usually implemented by an EDR

https://github.com/cpu0x00/Ghost

#edr #bypass #loader
Real world malware delivery and initial access techniques (red teaming). Good source of inspiration.

Top 50 Techniques & Procedures
https://blog.redteamguides.com/top-50-techniques-proceduresrtc0019

#redteam
New blog on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that identified by author in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.

https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/

Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.

https://github.com/passthehashbrowns/Being-A-Good-CLR-Host

#redteam #net #clr