ENNAENNA

ScareCrow

Featured

๐Ÿ”ฅ Offensive Ops ยท Go

ScareCrow is a payload creation framework designed to generate loaders that bypass Endpoint Detection and Response (EDR) products. It uses direct Windows system calls instead of standard WinAPI calls, avoiding the userland hooks that EDR products use for detection. ScareCrow supports multiple loader types (DLL sideloading, binary, JScript, HTA), code signing with spoofed certificates, and integration with shellcode generators like Donut. It represents the current state of the art in EDR evasion.

2.9kstars
530forks
7issues
Updated 2y ago
+I use this

Use Cases

  • Generating EDR-evading payload loaders
  • Direct syscall execution to bypass hooks
  • Code signing with spoofed certificates
  • DLL sideloading payload delivery
  • Testing EDR detection capabilities

Tags

edr-bypasssyscallsloaderevasioncode-signing

Community Reviews

More in Offensive Ops