Projects
Research, Build, and Security Tooling Experiments.
This is a personal project where I study antivirus (AV) and endpoint detection & response (EDR) behaviors, develop custom payload obfuscation pipelines, implement encryption/decryption payloads, and examine in-memory execution patterns. I intentionally modify previous projects (logic flow, refactor functions, etc.) to produce a fresh, clean sample of the same malware family. The goal is to demonstrate how attackers operate in the wild so defenders can learn, tune detection, and close gaps.
Clarification: The techniques discussed are research demonstrations rather than confirmed vulnerabilities. A bypass illustrates an evasion method, not an inherent product vulnerabilities; it demonstrates how an attacker could potentially craft tools to bypass detection. Endpoint Detection and Response (EDR) solutions are most effective when properly tuned and deployed as part of a layered security strategy with other security controls.