Skip to content

KohChia/breakcyserver

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

breakcyserver


Full post in: https://waawaa.github.io/


1. Kill EDR services by killing all the opened handles of the EDR process.
2. Bypass PPL by abussing some Process Explorer drivers functionalities.
3. Bypass ObRegisterCallbacks implementation by abussing Process Explorer driver functionalities.


PS: Added Implementation to load the driver manually without ProcessExplorer.
LoadDriver.exe /LOAD
LoadDriver.exe /UNLOAD

Evasion Alert:

EDRs and XDRs might notice an unsigned EXE loading a driver and adding a registry key, therefore the following trick was found.
Obivously opening procexp will alert the victim and would look weird, so by using the /t flag, procexp will be opened
minimized and the driver will be loaded by the procexp64.exe signed binary.

.\procexp64.exe -accepteula /t  

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 76.0%
  • C 24.0%