
An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed to silently disable antivirus and EDR , with explicit references to rootkits , advanced persistence , and zero-day UAC bypass .
The stated price is $500 , with direct contact via Telegram and a list of “supported” security solutions that includes leading names: Windows Defender, ESET, Kaspersky, Bitdefender, Malwarebytes and others .
A proposal that, if authentic, falls into the high-end category of cybercrime-as-a-service.
Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness purposes only. Red Hot Cyber condemns any unauthorized access, improper dissemination, or misuse of this data. It is currently not possible to independently verify the authenticity of the information reported, as the organization involved has not yet released an official statement on its website. Therefore, this article should be considered for informational and intelligence purposes only.

EDRs (Endpoint Detection and Response) are advanced security solutions designed to go beyond traditional antivirus. Their job is not only to block malicious files, but also to constantly monitor system behavior .
In summary, an EDR:
Unlike classic AVs, many EDRs operate at the kernel level , making them more difficult to disable by malicious code running in user-mode.

In modern cybercrime, especially in the context of ransomware and targeted intrusions , the first step after initial access is almost always the neutralization of defenses . An active EDR:
For this reason, the ability to “blind” or silently disable EDRs has become a market value in underground forums.
Posts like the one on NtKiller reference theoretically known techniques, already observed in advanced APT and ransomware campaigns. These aren’t “magical” exploits, but rather deep abuses of the operating system architecture .
Among the macro-categories of bypass commonly discussed in underground circuits:
It should be noted that not all advertisements on underground forums correspond to truly effective tools . Many are:
Posts like this confirm that:
For defenders, observing these forums is not about “learning to attack,” but about understanding how the adversary thinks , what promises are being sold, and what capabilities are considered “valuable” in the cybercriminal underworld.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
