Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Network Communication Blocker Tool That Neutralizes EDR/AV

Posted on November 16, 2025November 16, 2025 By CWS

A brand new open-source instrument referred to as SilentButDeadly has emerged, designed to disrupt Endpoint Detection and Response (EDR) and antivirus (AV) software program by severing their community communications.

Developed by safety researcher Ryan Framiñán, the instrument leverages the Home windows Filtering Platform (WFP) to create short-term, bidirectional blocks on EDR cloud connectivity, isolating threats with out terminating processes.

His method builds on the 2023 EDRSilencer method, providing improved operational security via dynamic, self-cleaning filters.

The instrument addresses a key vulnerability in trendy EDR architectures, which rely closely on cloud-based telemetry for real-time evaluation and updates. By stopping outbound knowledge uploads and inbound command reception, SilentButDeadly successfully neuters distant administration and menace intelligence sharing.

Not like aggressive evasion strategies that disrupt safety processes, it focuses on stealthy community isolation, making it superb for red-team workouts and malware evaluation in managed environments. Framiñán’s implementation ensures no persistent artifacts stay until explicitly configured, decreasing forensic footprints.

SilentButDeadly Execution

SilentButDeadly’s execution unfolds in structured phases, starting with privilege verification utilizing Home windows APIs like CheckTokenMembership() to substantiate administrator entry. Customers are prompted interactively to proceed, enhancing management.

The core discovery section scans operating processes by way of CreateToolhelp32Snapshot(), matching towards a predefined record of EDR targets corresponding to SentinelOne’s SentinelAgent.exe and Microsoft Defender’s MsMpEng.exe. As soon as recognized, it queries full course of paths and initializes WFP with a dynamic session flagged by FWPM_SESSION_FLAG_DYNAMIC for automated cleanup.

Community blocking is applied at ALE layers: outbound by way of FWPM_LAYER_ALE_AUTH_CONNECT_V4 and inbound by way of FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4, utilizing high-priority weights (0x7FFF) and process-specific AppID circumstances.

Filters convert executable paths to WFP blobs with FwpmGetAppIdFromFileName0(), making certain exact concentrating on. Following isolation, the instrument disrupts providers by stopping them gracefully and setting startup sorts to SERVICE_DISABLED, stopping restarts. A abstract shows affected processes, block counts, and WFP standing earlier than optionally available cleanup removes all guidelines.

Supported targets embody SentinelOne, Home windows Defender, and Defender ATP (MsSense.exe), with extensibility by way of a easy array. Command-line choices like –verbose for logging and –persistent for enduring filters add flexibility, whereas sturdy error dealing with gives sleek fallbacks.

Security measures emphasize legit APIs solely, no kernel tweaks, although it requires admin rights. Operationally, it severs EDR updates, telemetry, and scans, however leaves native detection intact. Detection dangers embody WFP occasion logs (IDs 5441, 5157) and repair modifications, detectable by way of netsh wfp instructions or PowerShell queries.

Framiñán stresses moral use for licensed testing, urging defenders to observe WFP modifications and implement resilient EDR designs with native caching.

Accessible on GitHub beneath loosehose/SilentButDeadly, the instrument sparks discussions on EDR dependencies, probably driving vendor enhancements. As cyber threats evolve, such analysis underscores the necessity for balanced architectures much less reliant on fixed connectivity.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Blocker, Communication, EDRAV, Network, Neutralizes, Tool

Post navigation

Previous Post: RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Next Post: Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser

Related Posts

NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News
Top 10 Best Dynamic Malware Analysis Tools in 2026 Cyber Security News
Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families
  • ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft
  • CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families
  • ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft
  • CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark