Defense Enumeration
LOLBAS
AV Evasion
Enumeration
Disable Security Protections
Bypass tools
Utilities
Identify Bad flags (AV/AMSI)
Techniques
AMSI
Enumeration
How to Bypass AMSI
Bypass reverse shell
Firewall
Enumeration
Disable Firewall
Manage firewall rules
EDR
AV Process List
Enumeration
Constrained Language Mode
Applocker
Enumeration
Device Guard
Enumerate
LSA Protection
Enumeration
User Account Control (UAC)
Enumeration
UAC Values
Event Log Cleansing
Writeable paths for non-admins
LOLBAS Usefull Commands to Bypass Security Solutions
regsvr32.exe – Remote Code Execution (No Disk Write)
regsvr32.exe – Remote Code Execution (No Disk Write) mshta.exe – HTML Application Loader
mshta.exe – HTML Application Loader powershell.exe with Base64 Payload
powershell.exe with Base64 Payload rundll32.exe – DLL Execution or COM Exploit
rundll32.exe – DLL Execution or COM Exploit InstallUtil.exe – .NET Binary Execution
InstallUtil.exe – .NET Binary Execution certutil.exe – Download and Decode Payloads
certutil.exe – Download and Decode Payloads forfiles.exe – Execute Command as File Handler
forfiles.exe – Execute Command as File Handler wmic.exe – Execute Commands Without PowerShell or CMD
wmic.exe – Execute Commands Without PowerShell or CMD schtasks.exe – Schedule Execution (Persistence + Evasion)
schtasks.exe – Schedule Execution (Persistence + Evasion) scriptrunner.exe – Executes Scripts via Signed Binary (SCCM)
scriptrunner.exe – Executes Scripts via Signed Binary (SCCM) msbuild.exe – Inline C# Payload Execution
msbuild.exe – Inline C# Payload ExecutionLast updated