_____ ______ _____ _____
/ ____| (_) | ____| __ \| __ \
| | _ __ _ _ __ ___ ___ ___ _ __ | |__ | | | | |__) |
| | | '__| | '_ ` _ \/ __|/ _ \| '_ \| __| | | | | _ /
| |____| | | | | | | | \__ \ (_) | | | | |____| |__| | | \ \
\_____|_| |_|_| |_| |_|___/\___/|_| |_|______|_____/|_| \_\
Developed by : Matthias Ossard
https://github.com/Helixo32/CrimsonEDR
Useful Links
Here are some useful resources that helped in the development of this project:
- Windows Processes, Nefarious Anomalies, and You
- MalDev Academy
Simulate The Behavior Of AV/EDR For Malware Development
- ltx_Lazzarus
- Posts: 55
- Joined: Tue Apr 09, 2024 8:05 pm
Simulate The Behavior Of AV/EDR For Malware Development
stopthe4ttack.box