Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Enterprise 1
EDRStartupHinder: Bypassing Windows EDR Security with BindLink

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

13 January 2026 15:10

Sometimes, to disable Windows protection , you don’t need to attack the antivirus directly. Simply preventing it from starting properly is sufficient.

A researcher who goes by the name Two Seven One Three ( TwoSevenOneT ) has published a tool called EDRStartupHinder on GitHub that exploits exactly this principle: blocking the startup of antivirus and EDR during the system boot phase, abusing a legitimate Windows mechanism based on path redirection.

The core of the technique is BindLink , a Windows API that allows you to “bind” a virtual local path to another location. In practice, file access is transparently redirected. Microsoft describes BindLink as a feature provided by the bindflt.sys driver, originally intended for compatibility reasons or for scenarios where physically remote files need to appear as if they were local.

The authors of EDRStartupHinder exploit this mechanism offensively. During Windows startup, the tool creates a redirect for a critical DLL in System32 , causing the targeted security process to load an “inappropriate” version of the library. This results in the immediate termination of the process, which is killed before it can initialize its defenses.

The project description is explicit: EDRStartupHinder prevents antivirus and EDR from starting by redirecting a key DLL from System32 to another location in the very early stages of boot.

The repository also cites a paper by Zero Salarium , which clarifies the technical context of the attack. Many security processes are started in PPL (Protected Process Light) , a mode that imposes severe restrictions on loadable libraries. If a critical dependency is manipulated before the checks are fully active, the process can “self-terminate” without ever initializing its self-defense mechanisms.

According to the author, the technique has been successfully tested on Windows Defender in Windows 11 25H2 , as well as on several commercial EDR solutions, the names of which have not been made public.

Version 1.0 of the tool was released on January 11, 2026. This is yet another example of how features designed to improve compatibility and flexibility can be transformed into powerful security bypass tools, especially during the delicate system boot phase, when first-mover security has a decisive advantage.

The Zero Salarium publication itself suggests some basic countermeasures: carefully monitor BindLink usage (especially bindlink.dll -related activity) and look for the appearance of suspicious services that start very early, even before EDR components.

If services suddenly appear in your infrastructure that are labeled as “required for compatibility,” and after a reboot, system protection is disabled, this is exactly the chain of events that should be analyzed first.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.