A tool for simulating AV/EDR behavior. The utility allows you to hone your skills in bypassing security measures when creating your own boot loaders.
1. Compile the project ./compile.sh
2. Create a file ioc.json with shellcode patterns
3. Launch the tool, specify the identifier of the...
Udemy - EDR Threat Hunting Threat Intelligence 2023, by Michel A. Goedeker
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Evading EDR
EPUB
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
PDF
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***