Test for EDR Hooks

EDRSandblast

EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TIprovider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.

Link: ‣

Evasion Techniques

This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.

Link: https://unprotect.it/

Obfuscation

Codecepticon

Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams. What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion.

Link: https://github.com/Accenture/Codecepticon