Bypass the Event Trace Windows(ETW) and unhook ntdll.
-
Updated
Sep 29, 2023 - C
Bypass the Event Trace Windows(ETW) and unhook ntdll.
Two in one, patch lifetime powershell console, no more etw and amsi!
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.
Event Tracing for Windows EDR bypass in Rust
code snippet provided demonstrates how to patch the EtwEventWrite function in the ntdll.dll library on Windows using CGO (C Go).
Loads a C# binary in memory within powershell profile, patching AMSI + ETW.
Bypassing Event Tracing for Windows (ETW) with CSharp
Add a description, image, and links to the etw-evasion topic page so that developers can more easily learn about it.
To associate your repository with the etw-evasion topic, visit your repo's landing page and select "manage topics."