A simple tool to automate the testing of EDR (Microsoft Windows Defender) bypass techniques using PowerShell commands. It generates an interactive HTML report and displays Window Defender logs. You're free to play around with the payloads (custom_payloads.json) and customize them.
SETUP Prerequisites for Remote Testing: WinRM Enabled: Target system must have WinRM enabled and configured Network Access: Port 5985 (WinRM) must be accessible Authentication: Appropriate credentials for remote system access PowerShell Remoting: PowerShell remoting must be enabled on target
EXECUTION python scripts/edr_test.py # Prompts for target IP python scripts/edr_test.py --target localhost # Local testing python scripts/edr_test.py --target 192.168.1.100 # Remote testing python scripts/edr_test.py --payloads custom.json --target 192.168.1.50 python scripts/edr_test.py --no-logscan --output report.html

