diff --git a/_posts/2024-11-26-segrun/2024-11-26-segrun.md b/_posts/2024-11-26-segrun/2024-11-26-segrun.md index 41e54ef..ac50c0a 100644 --- a/_posts/2024-11-26-segrun/2024-11-26-segrun.md +++ b/_posts/2024-11-26-segrun/2024-11-26-segrun.md @@ -169,4 +169,6 @@ Here’s how the program operates once the exception handler is set up, the EDR ![](segrun4.png) -By leveraging this workflow, the technique ensures that the hooked function executes successfully without alerting the EDR or triggering its monitoring mechanisms. The complete PoC project can be found at the following link: https://github.com/ikerl/segrun +By leveraging this workflow, the technique ensures that the hooked function executes successfully without alerting the EDR or triggering its monitoring mechanisms. The complete PoC project can be found at the following link: [segrun](https://github.com/ikerl/segrun) + +At the time of publication the prepared poc has been tested with Bitdefender to successfully evade userland hooks.