An open API service indexing awesome lists of open source software.

https://github.com/kara-4search/windowseventlogsbypass_csharp

Bypass windows eventlogs & Sysmon
https://github.com/kara-4search/windowseventlogsbypass_csharp

administrator-privilege avatar bypass bypass-uac csharp eventlogs pentest redteam sleep sysmon

Last synced: 26 days ago
JSON representation

Bypass windows eventlogs & Sysmon

Awesome Lists containing this project

README

        

# WindowsEventLogsBypass_Csharp

Blog link: working on it
* Bypass **windows eventlogs** & **Sysmon**,only tested in win10_x64.

* Only for red team purpose, and you need to change the codes if u use it for pentest.
* You need **administrator privilege** to run it.
* You also need **administrator privilege** to debug or test the code(In VS).
* Feel free to make any issues or advice.

Process Explorer

![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/Screen%20Shot%202021-05-31%20at%205.05.31%20PM.png)

![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/Screen%20Shot%202021-05-31%20at%205.22.34%20PM.png)

## Usage

1. Remove the “System.Threading.Thread.Sleep” in main function,the “System.Threading.Thread.Sleep” is for debugging purpose.

​ ![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/WindowsEventLogsBypass_Csharp_sleep.png)

2. Run it with **administrator privilege**, for that you gonna need to bypass UAC first.(which I will update a bypass UAC project soon).

3. if u need to debug or test it you need to run VS with **administrator privilege** first, open a powershell or a cmd with **administrator privilege** and run your VS(

* for example

* cd “C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE”;

* .\devenv.exe

![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/WindowsEventLogsBypass_Csharp_dev.png)

## TO-DO list
1. Restruct code

## Update history
- NONE

## Reference link

1. https://www.pinvoke.net/search.aspx?search=NtWriteVirtualMemory&namespace=[All]
2. https://wj32.org/wp/2010/03/30/howto-use-i_querytaginformation/
3. https://github.com/3gstudent/Eventlogedit-evtx--Evolution/blob/master/SuspendorResumeTidEx.cpp
4. https://0cch.com/2015/01/24/e794a8service-tage58cbae58886e585b1e4baabe7b1bbe59e8be69c8de58aa1e7babfe7a88b/
5. https://artofpwn.com/2017/06/05/phant0m-killing-windows-event-log.html
6. https://www.ired.team/offensive-security/defense-evasion/disabling-windows-event-logs-by-suspending-eventlog-service-threads
7. https://blog.csdn.net/singleyellow/article/details/93394557
8. https://github.com/3gstudent/Windows-EventLog-Bypass/blob/master/WindowsEventLogBypass.cpp
9. https://www.pinvoke.net/default.aspx/advapi32.adjusttokenprivileges

1. https://www.cnblogs.com/DeeLMind/p/7194102.html
2. https://www.pinvoke.net/default.aspx/kernel32/SuspendThread.html