Simulate The Behavior Of AV/EDR For Malware Development

Tools
User avatar
ltx_Lazzarus
Posts: 55
Joined: Tue Apr 09, 2024 8:05 pm

Simulate The Behavior Of AV/EDR For Malware Development

Postby ltx_Lazzarus » Sun May 05, 2024 7:52 am

_____ ______ _____ _____
/ ____| (_) | ____| __ \| __ \
| | _ __ _ _ __ ___ ___ ___ _ __ | |__ | | | | |__) |
| | | '__| | '_ ` _ \/ __|/ _ \| '_ \| __| | | | | _ /
| |____| | | | | | | | \__ \ (_) | | | | |____| |__| | | \ \
\_____|_| |_|_| |_| |_|___/\___/|_| |_|______|_____/|_| \_\

Developed by : Matthias Ossard
https://github.com/Helixo32/CrimsonEDR

Useful Links
Here are some useful resources that helped in the development of this project:
- Windows Processes, Nefarious Anomalies, and You
- MalDev Academy
stopthe4ttack.box

Return to “Tools”