• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

ScareCrow v5.1 - Payload creation framework designed around EDR bypass

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,602
Solutions
2
Reputation
32
Reaction score
100,445
Points
2,313
Credits
32,540
‎6 Years of Service‎
 
76%
File_Attributes.png


ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, utilizing a technique to flush an EDR’s hook out the system DLLs running in the process’s memory. This works because we know the EDR’s hooks are placed when a process is spawned. ScareCrow can target these DLLs and manipulate them in memory by using the API function VirtualProtect, which changes a section of a process’ memory permissions to a different value, specifically from Execute–Read to Read-Write-Execute.

Changelog v5.1

Bug Fixes

    Fixed issue with the --outpath and the sha256

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top