all InfoSec news
Acheron - Indirect Syscalls For AV/EDR Evasion In Go Assembly
May 23, 2023, 12:30 p.m. | noreply@blogger.com (Unknown)
KitPloit - PenTest Tools! www.kitploit.com
Acheron is a library inspired by SysWhisper3/FreshyCalls/RecycledGate, with most of the functionality implemented in Go assembly.
acheron
package can be used to add indirect syscall capabilities to your Golang tradecraft, to bypass AV/EDRs that makes use of usermode hooks and instrumentation callbacks to detect anomalous syscalls that don't return to ntdll.dll, when the call transition back from kernel->userland.
Main Features
- No dependencies
- Pure Go and Go assembly implementation
- Custom string encryption/hashing function support to counter …
acheron adversary emulation av evasion edr bypass edr evasion offensive security red team red teaming
More from www.kitploit.com / KitPloit - PenTest Tools!
VectorKernel - PoCs For Kernelmode Rootkit Techniques Research
5 days, 10 hours ago |
www.kitploit.com
Cookie-Monster - BOF To Steal Browser Cookies & Credentials
6 days, 10 hours ago |
www.kitploit.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Advisory Red Consultant
@ Security Risk Advisors | Philadelphia, Pennsylvania, United States
Cyber Business Transformation Change Analyst
@ National Grid | Warwick, GB, CV34 6DA
Cyber Security Analyst
@ Ford Motor Company | Mexico City, MEX, Mexico
Associate Administrator, Cyber Security Governance (Fort Myers)
@ Millennium Physician Group | Fort Myers, FL, United States
Embedded GSOC Lead Operator, Events
@ Sibylline Ltd | Seattle, WA, United States