Hello xss.
I've been trying for over a month to get past the Windows Defender EDR with no success. I've tried looking into the artifact kit, but I'm not good enough to modify it myself to get it past the defender. I'm not even sure what causes the triggers in the first place.
Tried working with the Sourcepoint C2 generator from github and changed some things like the URIs and other strings around and made sure to have the sleep mask and obfuscation enabled. No success there either.
I even purchased a crypter, but even crypted it still gets detected. This time it's not detected as cobalt strike but as a generic trojan wakatak. After this I tried using a public loader from github and encrypting the stub afterwards. This doesn't get detected, but it won't connect to the c2 either.
How do the pros do it? Or even the more successful skids for that mater. Is there no way for the average skid to make it bypass defender?
I've been trying for over a month to get past the Windows Defender EDR with no success. I've tried looking into the artifact kit, but I'm not good enough to modify it myself to get it past the defender. I'm not even sure what causes the triggers in the first place.
Tried working with the Sourcepoint C2 generator from github and changed some things like the URIs and other strings around and made sure to have the sleep mask and obfuscation enabled. No success there either.
I even purchased a crypter, but even crypted it still gets detected. This time it's not detected as cobalt strike but as a generic trojan wakatak. After this I tried using a public loader from github and encrypting the stub afterwards. This doesn't get detected, but it won't connect to the c2 either.
How do the pros do it? Or even the more successful skids for that mater. Is there no way for the average skid to make it bypass defender?
