Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption – Part 1 #WindowsDefender #AntivirusBypass #Cybersecurity #Syscalls #XOREncryption https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/
Hackmosphere
Windows Defender antivirus bypass in 2025 - part 1
Discover how antivirus works and how to setup a lab for (Windows Defender) antivirus bypass. Basic code is provided to start experimenting !
👍3
Bypassing Detections with Command-Line Obfuscation
#ArgFuscator
#Windows
#LinuxMACOS
https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation
#ArgFuscator
#Windows
#LinuxMACOS
https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation
www.wietzebeukema.nl
Bypassing Detections with Command-Line Obfuscation
Defensive tools like AVs and EDRs rely on command-line arguments for detecting malicious activity. This post demonstrates how command-line obfuscation, a shell-independent technique that exploits executables’ parsing “flaws”, can bypass such detections. It…
👍1
Forwarded from Sec Note
👍1
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x44.cc
https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html
https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html
👍3
ByteShield pinned «Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x44.cc https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html»
This media is not supported in your browser
VIEW IN TELEGRAM
You started this war, but we will draw its end.