EN
ENNA
SC

ScareCrow

Featured

🔥 Offensive Ops · Go

ScareCrow is a payload creation framework designed to generate loaders that bypass Endpoint Detection and Response (EDR) products. It uses direct Windows system calls instead of standard WinAPI calls, avoiding the userland hooks that EDR products use for detection. ScareCrow supports multiple loader types (DLL sideloading, binary, JScript, HTA), code signing with spoofed certificates, and integration with shellcode generators like Donut. It represents the current state of the art in EDR evasion.

Use Cases

  • Generating EDR-evading payload loaders
  • Direct syscall execution to bypass hooks
  • Code signing with spoofed certificates
  • DLL sideloading payload delivery
  • Testing EDR detection capabilities

Tags

edr-bypasssyscallsloaderevasioncode-signing

More in Offensive Ops