Just use direct syscalls and try to avoid process injection. In my case, I had great success with bypassing EDRs such as Sentinel1, CS, ATP etc. DLL sideloading works great too.
No friend!If you obfuscate your source code it song affect output binary. Even if you call string sYsoJejaoheJuesjjs, it won't help
Thanks, if you have any article/video/codeJust use direct syscalls and try to avoid process injection. In my case, I had great success with bypassing EDRs such as Sentinel1, CS, ATP etc. DLL sideloading works great too.
https://alice.climent-pommeret.red/posts/direct-syscalls-hells-halos-syswhispers2/Thanks, if you have any article/video/code
it would help me a lot
FFS. That was a thing in VB6 or so.And the variables and functions are just with random names! To bypass signatures