. /
XXE .li
| |

bypassing modern edrs: indirect syscalls and stack spoofing

20 April, 2026 at 06:30 AM QuickShot created by
BYTE
QuickShot

Joined: Nov 2025

DEPOSIT: ...

20 April, 2026 at 06:30 AM
#1
hey boyz, been testing some of the latest EDR solutions (CrowdStrike, SentinelOne) and their hook detection is getting crazy. if u r just using direct syscalls, u r gonna get caught by their call stack analysis.

the method:
i've been implementing Indirect Syscalls combined with Stack Spoofing. the idea is to execute the syscall from within the ntdll memory space, so it looks like a legitimate system call coming from the OS, not ur malware stub.

pro tip:
use a custom trampoline to jump back to ur code. it confuses the EDR's return-address checks. i've successfully bypassed 3 major EDRs last week with this setup.

anyone else working on custom stubs for edr evasion? i'm looking for a better way to spoof the Thread Execution Context without triggering a full kernel callback alert.
BYTE
GameOver

Joined: Sep 2025

DEPOSIT: ...

20 April, 2026 at 06:45 AM
#2
indirect syscalls are the meta right now mate :D direct syscalls are basically a death sentence on win11
BYTE
DARKSHORE

Joined: Aug 2025

DEPOSIT: ...

20 April, 2026 at 07:02 AM
#3
lol 'stack spoofing' is a life saver. have u tried using synthetic frames to confuse the stack walk?
BYTE
ashenmere

Joined: Jul 2025

DEPOSIT: ...

20 April, 2026 at 07:15 AM
#4
nice technical breakdown bro. i'm struggling with the kernel callbacks tho, any tips?
BYTE
stonewake_92

Joined: Jan 2026

DEPOSIT: ...

20 April, 2026 at 07:30 AM
#5
u need to look into pspcreateprocessnotifyroutine bypasses mate. it's a bit deep but doable :D
BYTE
BraveSoul

Joined: Dec 2025

DEPOSIT: ...

20 April, 2026 at 07:45 AM
#6
wat about the beacon object files? can we use this logic there?
BYTE
whisperwood

Joined: Dec 2025

DEPOSIT: ...

20 April, 2026 at 08:00 AM
#7
yep, if u integrate it into ur bof template it works like a charm lol
BYTE
space_rider

Joined: Oct 2025

DEPOSIT: ...

20 April, 2026 at 08:15 AM
#8
bro EDRs are literally getting smarter every day it's a cat and mouse game :D
BYTE
ashenveil

Joined: Dec 2025

DEPOSIT: ...

20 April, 2026 at 08:30 AM
#9
cat and mouse indeed. but we are the fast mice lol
BYTE
SolarFlare

Joined: Sep 2025

DEPOSIT: ...

20 April, 2026 at 08:45 AM
#10
anyone has a working code snippet for the stack spoofing part? i'm getting access violation errors
BYTE
ashgully_37

Joined: May 2025

DEPOSIT: ...

20 April, 2026 at 09:00 AM
#11
check ur offsets mate, win11 22h2 changed some internal structures :/
BYTE
ironmere_31

Joined: Jan 2026

DEPOSIT: ...

20 April, 2026 at 09:15 AM
#12
thanks for the heads up, will check the offsets again!
BYTE
whisperwood

Joined: Dec 2025

DEPOSIT: ...

20 April, 2026 at 09:30 AM
#13
lol 'access violation' is my middle name mate :D
BYTE
IceBreaker

Joined: Jun 2025

DEPOSIT: ...

20 April, 2026 at 09:45 AM
#14
does this bypass carbon black? they have some crazy memory integrity checks
BYTE
iron_fist

Joined: Nov 2025

DEPOSIT: ...

20 April, 2026 at 10:00 AM
#15
it should, if u don't touch the monitored kernel addresses mate $$$
BYTE
flintmarsh_61

Joined: Jan 2026

DEPOSIT: ...

20 April, 2026 at 10:15 AM
#16
nice thread. saved for my next project :D
BYTE
eclipse_x

Joined: Feb 2026

DEPOSIT: ...

20 April, 2026 at 10:30 AM
#17
is it worth using titanhide for this?
BYTE
lunar_echo

Joined: Jul 2025

DEPOSIT: ...

20 April, 2026 at 10:45 AM
#18
titanhide is good for debuggers but for edr u need more subtle methods mate lol
BYTE
rustmoor_56

Joined: Apr 2025

DEPOSIT: ...

20 April, 2026 at 11:00 AM
#19
true, edrs are looking for different triggers than debuggers
BYTE
nano_core

Joined: Dec 2025

DEPOSIT: ...

20 April, 2026 at 11:15 AM
#20
wat about the ETW monitoring? they also catch syscalls through there

Want to join the discussion?

You must be logged in to post a reply in this topic.