mortar
TelemetrySourcerer
mortar | TelemetrySourcerer | |
---|---|---|
3 | 1 | |
1,348 | 728 | |
1.0% | - | |
5.7 | 3.2 | |
4 months ago | about 3 years ago | |
Pascal | C++ | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mortar
- Mortar Loader: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR) - Mortar Loader performs encryption and decryption of selected binary inside the memory streams and execute it directly with out writing any malicious indicator into the hard-drive
-
mortar: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
it is now fixed, it was an issue with the encryptor.https://github.com/0xsp-SRD/mortar/issues/1
TelemetrySourcerer
What are some alternatives?
DefenderCheck - Identifies the bytes that Microsoft Defender flags on.
DripLoader - Evasive shellcode loader for bypassing event-based injection detection (PoC)
Veil - Veil 3.1.X (Check version info in Veil at runtime)
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
URL-obfuscator - Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Forensia - Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
adversarial-robustness-toolbox - Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Payload-Download-Cradles - This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.