Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ SharpEDRChecker - Checks Running Processes, Process Metadata, DLLs Loaded Into Your Current Process And The Each DLLs Metadata, Common Inst all Directories, Installed Services And Each Service Binaries Metadata, Installed Drivers And Each Drivers Met

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š SharpEDRChecker - Checks Running Processes, Process Metadata, DLLs Loaded Into Your Current Process And The Each DLLs Metadata, Common Inst all Directories, Installed Services And Each Service Binaries Metadata, Installed Drivers And Each Drivers Met


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools. Catches hidden EDRs as well via its metadata checks, more info in a blog post coming soon.

This binary can be loaded into your C2 server by loading the module then running it. Note: this binary is now included in PoshC2 so no need to manually add it.


I will continue to add and improve the list when time permits. A full roadmap can be found below.

Find me on twitter @PwnDexter for any issues or questions!


Install & Compile

Git clone the repo down and open the solution in Visual Studio then build the project or alternatively download the latest release from here.

git clone https://github.com/PwnDexter/SharpEDRChecker.git

Usage

Once the binary has been loaded onto your host or into your C2 of choice, you can use the following commands:

Run the binary against the local host and perform checks based on current user integrity:

.\SharpEDRChecker.exe
run-exe SharpEDRChecker.Program SharpEDRChecker

For use in PoshC2 ise the following:

sharpedrchecker

Roadmap
  • Add more EDR Products - never ending
  • Test across more Windows and .NET versions
  • Add remote host query capability
  • Port to python for unix/macos support

Example Output

Initial start down C2:

ย 

Processes:


Modloads in your process:


Directories:


Services:


Drivers:


ย TLDR Summary:



...



๐Ÿ“Œ Show All Open Files, Directories, Sockets, Pipes, Devices, by All Running Processes on Mac with Sloth


๐Ÿ“ˆ 48.03 Punkte

๐Ÿ“Œ Polypyus - Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries


๐Ÿ“ˆ 45.71 Punkte

๐Ÿ“Œ Industrial Secure Routers EDR-810 / EDR-G902 / EDR-G903 Access Bypass


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ [webapps] - Industrial Secure Routers EDR-810 / EDR-G902 / EDR-G903 - Insecure Configuration Management


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ Industrial Secure Routers EDR-810 / EDR-G902 / EDR-G903 Access Bypass


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ [webapps] - Industrial Secure Routers EDR-810 / EDR-G902 / EDR-G903 - Insecure Configuration Management


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ Moxa EDR-810/EDR-G902/EDR-G903 Remote Privilege Escalation [CVE-2020-28144]


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ CVE-2023-4452 | Moxa EDR-810/EDR G902/EDR G903 URI Validator buffer overflow


๐Ÿ“ˆ 42.9 Punkte

๐Ÿ“Œ Running Intel Binaries in Linux VMs with Rosetta: Run x86_64 Linux binaries under ARM Linux on Apple silicon.


๐Ÿ“ˆ 42.37 Punkte

๐Ÿ“Œ google thought it was a such a great idea to start logging you into everything when you logged into somethingโ€ฆ that it forgot to ask.


๐Ÿ“ˆ 39.77 Punkte

๐Ÿ“Œ Security Firms Warn Microsoft of Signed Drivers Used to Kill EDR, AV Processes


๐Ÿ“ˆ 36.55 Punkte

๐Ÿ“Œ nix-bundle builds portable binaries (something like appimage binaries) using the nix package manager


๐Ÿ“ˆ 33.39 Punkte

๐Ÿ“Œ Current user groups vs current process groups.


๐Ÿ“ˆ 33.33 Punkte

๐Ÿ“Œ Command Help with "Top 10 Sub Directories w/ Largest File Total Size Excluding Further Sub Directories"


๐Ÿ“ˆ 33.15 Punkte

๐Ÿ“Œ Find all pairs such that (X, Y) such that X^2 = Y and X < Y


๐Ÿ“ˆ 33 Punkte

๐Ÿ“Œ Attackers Target Company Recruitment Processes With Phoney Job Applications Loaded With Quasar RAT


๐Ÿ“ˆ 32.12 Punkte

๐Ÿ“Œ James Webb Telescope Images Loaded With Malware Are Evading EDR


๐Ÿ“ˆ 31.96 Punkte

๐Ÿ“Œ Bugtraq: Executable installers are vulnerable^WEVIL (case 35): eclipse-inst-win*.exe vulnerable to DLL and EXE hijacking


๐Ÿ“ˆ 31.29 Punkte

๐Ÿ“Œ Bugtraq: Executable installers are vulnerable^WEVIL (case 35): eclipse-inst-win*.exe vulnerable to DLL and EXE hijacking


๐Ÿ“ˆ 31.29 Punkte

๐Ÿ“Œ http://www.investigation.inst.police.go.th/download/


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ http://ceramology-inst.gov.ua/own.htm


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ Node enables companies to build AI into their applications, products, and business processes


๐Ÿ“ˆ 29.98 Punkte

๐Ÿ“Œ pyrasite โ€“ Inject Code Into Running Python Processes


๐Ÿ“ˆ 29.68 Punkte

๐Ÿ“Œ Microsoft 365: Most Common Threat Vectors & Defensive Tips


๐Ÿ“ˆ 29.5 Punkte

๐Ÿ“Œ Microsoft 365: Most Common Threat Vectors & Defensive Tips


๐Ÿ“ˆ 29.5 Punkte

๐Ÿ“Œ chrome users are now automatically signed into the browser if they're signed into any other google service, such as gmail.


๐Ÿ“ˆ 29.48 Punkte











matomo