Handbook V – Maldev

Last Updated on October 16, 2025 by aghanim

Work in Progress

Courses

SEKTOR7 Institute

https://maldevacademy.com/

EvasionEDR By Matt Hand

Sources

URLDescriptionCategory
https://github.com/NUL0x4C/HellShellHellShell GitHub repositoryPenetration Testing
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weaponExploit writing tutorial on Corelan.beExploit Development
https://www.corelan.be/Corelan.be websiteCybersecurity
https://github.com/Krypteria/AtlasLdrAtlasLdr GitHub repositoryMalware Analysis
https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/Article on obfuscating C2 during Red Team engagementRed Teaming
https://github.com/matterpreter/DefenderCheckDefenderCheck GitHub repositorySecurity Tools
https://pinvoke.net/PInvoke.net – Platform Invoke for .NETProgramming
https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0ConfuserEx GitHub repository (v1.6.0 release)Malware Analysis
https://virusscan.jotti.org/en-US/scan-fileJotti’s Virus Scan – File scanning toolAntivirus
https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-lowArticle on direct syscalls in Red TeamingRed Teaming
https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/Raspberry Robin anti-evasion exploit analysisExploit Analysis
https://vanmieghem.io/process-injection-evading-edr-in-2023/Article on process injection and EDR evasionCybersecurity
https://redsiege.com/blog/2023/04/evading-crowdstrike-falcon-using-entropy/Evading Crowdstrike Falcon using entropyEvasion Techniques
https://evasions.checkpoint.com/Check Point Evasions – Evasion techniquesEvasion Techniques
https://vx-underground.org/VX Underground – Malware and Exploit CommunityMalware Analysis
Home – Unprotect ProjectSearch Evasion TechniquesEvasion Techniques

x86 & x64 Assembler and Disassembler

Wondering what your shellcode is doing? This website will disassemble it for you and show the instructions.

Online x86 and x64 Intel Instruction Assembler

Callback function list

aahmad097/AlternativeShellcodeExec: Alternative Shellcode Execution Via Callbacks (github.com)

According to Microsoft, a callback function is code within a managed application that helps an unmanaged DLL function complete a task. Calls to a callback function pass indirectly from a managed application, through a DLL function, and back to the managed implementation.

Example: Using  CertEnumSystemStore 

MSDN Documentation for CertEnumSystemStore

#include <windows.h>
#include <wincrypt.h>
#include <stdio.h>

// Shellcode payload
unsigned char shellcode[] =
"\x90\x90\x90\x90"  // NOPs for padding
"\xcc";             // INT 3 (breakpoint for debugging)

BOOL WINAPI Payload(const void *pvSystemStore, DWORD dwFlags, PCERT_SYSTEM_STORE_INFO pStoreInfo, void *pvReserved, void *pvArg) {
    ((void(*)())shellcode)();
    return TRUE;
}

int main() {
    if (!CertEnumSystemStore(CERT_SYSTEM_STORE_CURRENT_USER, NULL, NULL, Payload)) {
        printf("[!] CertEnumSystemStore Failed With Error : %d \n", GetLastError());
        return -1;
    }
    return 0;
}

Convert raw shellcode to raw binary format

Use CyberChef. Copy the shellcode to Cyberchef and choose “From Hex” as operations. Then save the output to .bin. This can be done the other way around also. From raw binary to shellcode.

EDR Telematry

EDR Telemetry Tracking for Windows – Google Drive

EDR Telematry v2

EDR Telemetry Project – Windows

Entropy reduction

Reducing entroy makes the data appear less random. A high entropy might indicate encryption and some EDRs might raise suspicion. Some of the techniques to reduce entroyp is:

Encoding After Encryption: Applying encoding like URL encoding reduces the range of characters used (e.g., using only alphanumeric characters and fewer symbols) while preserving the data’s integrity. This limits the number of unique bytes, decreasing the perceived randomness.

Disguising the Encoded Payload: After encoding, disguise the payload by embedding it into seemingly legitimate data, such as fake URLs, CSV files, or even certificates. This helps evade detection during analysis or reverse engineering.

Loader Decoding and Execution: The loader should read and decode the disguised data, reverting it to its original form before execution.

HijackLibs

HijackLibs

This project provides an curated list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables is kept and can be searched via this website. Additionally, further metadata such as resources provide more context.

Joesandbox – Malware Analysis

Can analyze malicous websites and files. Collections available.

Automated Malware Analysis – Joe Sandbox Cloud Basic

Deep Malware and Phishing Analysis – Joe Sandbox

Malapi.io

MalAPI.io

MalAPI.io maps Windows APIs to common techniques used by malware.

No-defender

es3n1n/no-defender: A slightly more fun way to disable windows defender + firewall. (through the WSC api) (github.com)

NtDoc – The native NT API online documentation

NtDoc – The native NT API online documentation (m417z.com)

This collection of Native API header files has been maintained since 2009 for the Process Hacker project, and is the most up-to-date set of Native API definitions that I know of. I have gathered these definitions from official Microsoft header files and symbol files, as well as a lot of reverse engineering and guessing. See phnt.h for more information.

Parasite-invoke

MzHmO/Parasite-Invoke: Hide your P/Invoke signatures through other people’s signed assemblies (github.com)

Hide your P/Invoke signatures through other people’s signed assemblies!

Reverse engineering of everything Microsoft

Geoff Chappell, Software Analyst

Kernel, Win32, Shell, Internet Explorer, Visual C++.

Vergilius project

Vergilius Project | About

This project provides a collection of Microsoft Windows kernel structures, unionsand enumerations.

Unprotect.it

Home – Unprotect Project

This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.

Evasion techniques

Evasion techniques (checkpoint.com)

In this encyclopedia we have attempted to gather all the known ways to detect virtualized environment grouping them into big categories. Some categories are inactive on main page: it means that content will be added later. If it isn’t stated explicitly which operating system is described, Windows is meant by default.

Windows Icons

Windows Icon locations:

%systemroot%\system32\imageres.dll
%systemroot%\system32\shell32.dll
%systemroot%\system32\ddores.dll
%systemroot%\system32\pifmgr.dll
%systemroot%\explorer.exe
%systemroot%\system32\accessibilitycpl.dll
%systemroot%\system32\moricons.dll
%systemroot%\system32\mmcndmgr.dll
%systemroot%\system32\mmres.dll
%systemroot%\system32\netcenter.dll
%systemroot%\system32\netshell.dll
%systemroot%\system32\networkexplorer.dll
%systemroot%\system32\pnidui.dll
%systemroot%\system32\sensorscpl.dll
%systemroot%\system32\setupapi.dll
%systemroot%\system32\wmploc.dll
%systemroot%\system32\wpdshext.dll
%systemroot%\system32\compstui.dll
%systemroot%\system32\ieframe.dll
%systemroot%\system32\dmdskres.dll
%systemroot%\system32\dsuiext.dll
%systemroot%\system32\mstscax.dll
%systemroot%\system32\wiashext.dll
%systemroot%\system32\comres.dll
%systemroot%\system32\mstsc.exe
%systemroot%\system32\actioncentercpl.dll
%systemroot%\system32\aclui.dll
%systemroot%\system32\autoplay.dll
%systemroot%\system32\comctl32.dll
%systemroot%\system32\filemgmt.dll
%systemroot%\system32\ncpa.cpl
%systemroot%\system32\url.dll
%systemroot%\system32\xwizards.dll

Iconfinder:

Icons – Iconfinder

Similar Posts

  • THM – Linux Privilege Escalation – Part 15

    Last Updated on September 28, 2022 by aghanim This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Table Of ContentsLinux Privilege escalation checklistEnumerationhostnameuname -a/proc/version/etc/issueps Commandenvsudo -llsId/etc/passwdhistoryifconfignetstatfind CommandFind files:General Linux CommandsAutomated Enumeration ToolsPrivilege Escalation: Kernel ExploitsHint/notes Privilege Escalation: SudoLeverage LD_PRELOADPrivilege Escalation:…

  • THM – Common Linux Privilege Escalation – Part 20

    Last Updated on January 25, 2022 by aghanim This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Table Of ContentsDirection og Privilege EscalationEnumerationAbusing SUID/GUID FilesFinding SUID BinariesExploiting Wriitable /etc/passwdEscaping Vi EditorExploiting CrontabExploitning…

  • THM – NMAP The Network Mapper – Part 2

    Last Updated on January 25, 2022 by aghanim Table Of ContentsIntroductionNmap switchesOverview  Introduction When a computer runs a network service, it opens a networking construct called a “port” to receive the connection. Ports are necessary for making multiple requests or having multiple services available.  For example, when you load several webpages at once in a web browser,…

  • THM – File Inclusion – Part 8

    Last Updated on January 25, 2022 by aghanim This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Table Of ContentsIntroductionWhat is File inclusion?Why do File inclusion vulnerabilities happen?What is the risk of File inclusion?Path TraversalPath traversalWhat function causes path…

  • Command And Control – C2 Framework

    Last Updated on October 3, 2024 by aghanim This is a list of Command and control (C2) servers that I’ve tested. Table Of ContentsCobalt StrikeCovenantInstallation and setupLisenersGruntsPowershell-Empire with StarkillerPoshC2GodGenesisMetasploitSliverLinks and tutorialInstallSliver and MetasploitBeacon vs sessionGenerating HTTP(S) Implants with certificateExtensions (Armory)CheatsheetExample getting beacon with msfBypassing defender with staged process hollowingHavoc C2InstallInstall the dependenciesUbuntu 20.04 / 22.04Kali…