Bypassing Windows Defender antivirus in 2025. Using Direct Syscalls and XOR encryption.
https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/
https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-2/
https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/
https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-2/
Hackmosphere
Windows Defender antivirus bypass in 2025 - part 1
Discover how antivirus works and how to setup a lab for (Windows Defender) antivirus bypass. Basic code is provided to start experimenting !
๐1
Exploiting Qualcomm based Android phones (slides)
"GPUAF - Two ways of Rooting All Qualcomm based Android phones"
https://powerofcommunity.net/poc2024/Pan%20Zhenpeng%20&%20Jheng%20Bing%20Jhong,%20GPUAF%20-%20Two%20ways%20of%20rooting%20All%20Qualcomm%20based%20Android%20phones.pdf
"GPUAF - Two ways of Rooting All Qualcomm based Android phones"
https://powerofcommunity.net/poc2024/Pan%20Zhenpeng%20&%20Jheng%20Bing%20Jhong,%20GPUAF%20-%20Two%20ways%20of%20rooting%20All%20Qualcomm%20based%20Android%20phones.pdf
๐ฅ2
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption โ Part 1 #WindowsDefender #AntivirusBypass #Cybersecurity #Syscalls #XOREncryption https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/
Hackmosphere
Windows Defender antivirus bypass in 2025 - part 1
Discover how antivirus works and how to setup a lab for (Windows Defender) antivirus bypass. Basic code is provided to start experimenting !
๐3
Bypassing Detections with Command-Line Obfuscation
#ArgFuscator
#Windows
#LinuxMACOS
https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation
#ArgFuscator
#Windows
#LinuxMACOS
https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation
www.wietzebeukema.nl
Bypassing Detections with Command-Line Obfuscation
Defensive tools like AVs and EDRs rely on command-line arguments for detecting malicious activity. This post demonstrates how command-line obfuscation, a shell-independent technique that exploits executablesโ parsing โflawsโ, can bypass such detections. Itโฆ
๐1
Forwarded from ๏ผณ๏ฝ
๏ฝ ๏ผฎ๏ฝ๏ฝ๏ฝ
๐1
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) ยท 0x44.cc
https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html
https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html
๐3
ByteShield pinned ยซReversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) ยท 0x44.cc https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.htmlยป