03-06-25, 10:14 PM
I've been analyzing how modern AV engines respond to custom crypters, particularly when using lightweight XOR and dynamic API resolution techniques.
In a controlled lab setup (non-malicious payloads only), I observed:
I'm building a PoC crypter to test detection rates across different AVs.
Anyone else experimenting with evasion trends for research or red team tooling?
--
Note: All testing is done on isolated VMs with non-malicious payloads.
In a controlled lab setup (non-malicious payloads only), I observed:
- Basic XOR with a static key gets flagged by most engines.
- Adding polymorphic stubs reduced detection significantly.
- AVs relying more on behavioral detection (like Microsoft Defender ATP) flagged payloads during execution, not at rest.
I'm building a PoC crypter to test detection rates across different AVs.
Anyone else experimenting with evasion trends for research or red team tooling?
--
Note: All testing is done on isolated VMs with non-malicious payloads.