In the constantly evolving landscape of cybersecurity, the ability to discreetly navigate past anti-virus (AV) and Endpoint Detection and Response (EDR) systems has become a pivotal skill for security professionals.
“BypassAV” delves into the intricate world of evading detection, offering a comprehensive map of essential techniques that prioritize manual strategies over detectable open-source tools.
This article serves as a guide to enhancing your cybersecurity measures, ensuring a deeper understanding of defense mechanisms and their vulnerabilities.
This map lists the essential techniques to bypass anti-virus and EDR.
As a reminder: it is highly recommended to read the articles related to manual techniques rather than using open source tools which are more likely to be suspected by the anti-virus because of IOSs
Bypass-AV.md is made using MarkMap. You can preview it online at matro7sh.github.io/BypassAV.
You can edit / preview it with some plugins:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…