CyberSecurity Blog

Various Posts around Cyber Sec

View on GitHub


With the general term “AV Evasion” we refer to the set of techniques that allows an attacker to execute arbitrary code into a system, bypassing all controls that should prevent her from doing it.


One of the key areas during a Red Team or penetration test is how to evade security controls such as an intrusion detection system (IDS), antivirus (AV) software and EDR solutions.

This is not always a trivial task, and it’s becoming more and more difficult to accomplish in a sensible, standard way. Most of the current techniques requires developing custom droppers or implants in order to bypass these controls.

In the following posts, I’m going to present a few among the methods that I commonly use in order to accomplish this, and a set of tools I’ve created to ease this process:

Back to Red Teaming

Back to Home