Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Network Communication Blocker Tool That Neutralizes EDR/AV

Network Communication Blocker Tool That Neutralizes EDR/AV

Posted on November 16, 2025November 16, 2025 By CWS

A brand new open-source instrument referred to as SilentButDeadly has emerged, designed to disrupt Endpoint Detection and Response (EDR) and antivirus (AV) software program by severing their community communications.

Developed by safety researcher Ryan Framiñán, the instrument leverages the Home windows Filtering Platform (WFP) to create short-term, bidirectional blocks on EDR cloud connectivity, isolating threats with out terminating processes.

His method builds on the 2023 EDRSilencer method, providing improved operational security via dynamic, self-cleaning filters.

The instrument addresses a key vulnerability in trendy EDR architectures, which rely closely on cloud-based telemetry for real-time evaluation and updates. By stopping outbound knowledge uploads and inbound command reception, SilentButDeadly successfully neuters distant administration and menace intelligence sharing.

Not like aggressive evasion strategies that disrupt safety processes, it focuses on stealthy community isolation, making it superb for red-team workouts and malware evaluation in managed environments. Framiñán’s implementation ensures no persistent artifacts stay until explicitly configured, decreasing forensic footprints.

SilentButDeadly Execution

SilentButDeadly’s execution unfolds in structured phases, starting with privilege verification utilizing Home windows APIs like CheckTokenMembership() to substantiate administrator entry. Customers are prompted interactively to proceed, enhancing management.

The core discovery section scans operating processes by way of CreateToolhelp32Snapshot(), matching towards a predefined record of EDR targets corresponding to SentinelOne’s SentinelAgent.exe and Microsoft Defender’s MsMpEng.exe. As soon as recognized, it queries full course of paths and initializes WFP with a dynamic session flagged by FWPM_SESSION_FLAG_DYNAMIC for automated cleanup.

Community blocking is applied at ALE layers: outbound by way of FWPM_LAYER_ALE_AUTH_CONNECT_V4 and inbound by way of FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4, utilizing high-priority weights (0x7FFF) and process-specific AppID circumstances.

Filters convert executable paths to WFP blobs with FwpmGetAppIdFromFileName0(), making certain exact concentrating on. Following isolation, the instrument disrupts providers by stopping them gracefully and setting startup sorts to SERVICE_DISABLED, stopping restarts. A abstract shows affected processes, block counts, and WFP standing earlier than optionally available cleanup removes all guidelines.

Supported targets embody SentinelOne, Home windows Defender, and Defender ATP (MsSense.exe), with extensibility by way of a easy array. Command-line choices like –verbose for logging and –persistent for enduring filters add flexibility, whereas sturdy error dealing with gives sleek fallbacks.

Security measures emphasize legit APIs solely, no kernel tweaks, although it requires admin rights. Operationally, it severs EDR updates, telemetry, and scans, however leaves native detection intact. Detection dangers embody WFP occasion logs (IDs 5441, 5157) and repair modifications, detectable by way of netsh wfp instructions or PowerShell queries.

Framiñán stresses moral use for licensed testing, urging defenders to observe WFP modifications and implement resilient EDR designs with native caching.

Accessible on GitHub beneath loosehose/SilentButDeadly, the instrument sparks discussions on EDR dependencies, probably driving vendor enhancements. As cyber threats evolve, such analysis underscores the necessity for balanced architectures much less reliant on fixed connectivity.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Blocker, Communication, EDRAV, Network, Neutralizes, Tool

Post navigation

Previous Post: RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Next Post: Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser

Related Posts

North Korean Hackers Make History with  Billion Crypto Heist in 2025 North Korean Hackers Make History with $2 Billion Crypto Heist in 2025 Cyber Security News
Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Cyber Security News
Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark