Antivirus

  • 5 Common Cyber Security Threats That Bypass Legacy AV: https://www.sentinelone.com/blog/5-common-cyber-security-threats-that-bypass-legacy-av/
  • Antivirus Event Analysis Cheat Sheet v1.4: https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
  • Bypassing Kaspersky Endpoint Security 11: http://0xc0ffee.io/blog/kes11-bypass
  • Hiding Metasploit Shellcode to Evade Windows Defender: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/
  • Enumerating Anti-Sandboxing Techniques - TrustedSec: https://www.trustedsec.com/2018/06/enumerating-anti-sandboxing-techniques/?utm_content=73303714&utm_medium=social&utm_source=twitter

  • Art of Anti Detection 1 – Introduction to AV & Detection Techniques: https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/

  • Art of Anti Detection 2 – PE Backdoor Manufacturing: https://pentest.blog/art-of-anti-detection-2-pe-backdoor-manufacturing/

Bypass

  • Python script designed to generate metasploit payloads that bypass common anti-virus solutions: https://github.com/Veil-Framework/Veil
  • Python script that takes an automated approach to AV evasion: https://github.com/v-p-b/peCloakCapstone/blob/master/peCloak.py
  • Open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script: https://www.owasp.org/index.php/OWASP%5FZSC%5FTool%5FProject
  • https://www.shellterproject.com/exclusive-features/