Active Filters:
📂 Persistence Techniques
Clear all filters

  Persistence Techniques

2 tools found

Showing 1-2 of 2 tool(s) in the category "Persistence Techniques"
ScareCrow
Persistence Techniques

ScareCrow

ScareCrow is a payload creation framework for side loading (not injecting) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, it utilizes a technique to flush an EDR’s hook out of the system DLLs running in the process's memory. This works because we know the EDR’s hooks are placed when a process is spawned.

Mangle
Persistence Techniques

Mangle

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

GPT - RedTeam.Blue