Skip to content
/ EDR-BAS Public

A simple tool to automate the testing of EDR bypass techniques using PowerShell commands. It generates an interactive HTML report and displays Window Defender logs.

License

Notifications You must be signed in to change notification settings

mbwika/EDR-BAS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EDR (Endpoint Detection and Response): BAS (Breach and Attack Simulation)

A simple tool to automate the testing of EDR (Microsoft Windows Defender) bypass techniques using PowerShell commands. It generates an interactive HTML report and displays Window Defender logs. You're free to play around with the payloads (custom_payloads.json) and customize them.

SETUP Prerequisites for Remote Testing: WinRM Enabled: Target system must have WinRM enabled and configured Network Access: Port 5985 (WinRM) must be accessible Authentication: Appropriate credentials for remote system access PowerShell Remoting: PowerShell remoting must be enabled on target

EXECUTION python scripts/edr_test.py # Prompts for target IP python scripts/edr_test.py --target localhost # Local testing python scripts/edr_test.py --target 192.168.1.100 # Remote testing python scripts/edr_test.py --payloads custom.json --target 192.168.1.50 python scripts/edr_test.py --no-logscan --output report.html

edr_test_results edr_vs_code

About

A simple tool to automate the testing of EDR bypass techniques using PowerShell commands. It generates an interactive HTML report and displays Window Defender logs.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published