Simple Trick: Code behavior detected by Anti-virus and Some AVs via Sleep/timer trick in C#
Video: youtube.com/watch?v=hmzKun6eFh

#Bypassing #penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Last updated 1 year ago

Two C# Methods and test on Win 11 [v22H2] with last updates.

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies say "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive

Last updated 2 years ago

Two C# Methods vs "Kaspersky cloud security v21.3"
now testing Kaspersky with last update 22/1/2023 and bypassed very well

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies says "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky

Last updated 2 years ago

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and ...

NativePayload_PE1 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both), simple Technique to bypass some Anti-viruses
Note: tested on WIN10 + WinDefender [update 2023/1/10]

github.com/DamonMoham
madbagher/NativePayload_PE1

#technique #inmemory #delegation #native #apis #Bypassing #behavior #redteam #pentesting

Last updated 2 years ago

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and ...

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX ;D
and
some anti-viruses companies says "COME-ON" ;p

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher

Last updated 2 years ago

two methods for code into local process and run in-memory without make any new process and ...
my new server Web-browser edition (for test only) with two (old but still useful) Techniques for Run
and i made Network C# core code for this New C# C2 server [web-browser edition] via + search in you.com, this site is awesome, all research only here in this site, still i really do not use Google.com after this "you.com" Search engine + AI and Chat etc
helps to fast research and i made C2 server very faster than before via you.com all things are faster and better but sometimes code are not good or have bug/error but its ok ;D i can handle that.

as you can see "runmem" and "runmem2" are two internal commands for my C2 and which two method my Assembly code is Running in-Memory (downloaded from address 192.168.56.102/payload.txt asm-bytes via text format and run in memory via C2 Server side code [NativePayload_ServerC2.exe]) and Windows Defender Bypassed very well, these methods are not new but sill useful in some AVs ;D

related video => infosec.exchange/@DamonMohamma

i will talk about Making C2 Server and these Codes in my New by one Chapter...

#injecting #Bypassing #antiviruses #c2 #assembly #bytes #inmemory #aichat #ai #ebook #redteam #pentesting

Last updated 2 years ago

as i said years ago C# and codes is really good for and also modern will use C# codes, because still Antivirus companies focus is on C/C++ codes more than others codes like C# also C# in-memory attacks really was successful experience against Anti-viruses (those days, even these days ;D) , now we see a lot course via C# programming also a lot C# Codes and Offensive C# Codes and Courses, that because Pentesters and Red-teamers really know what they can do by C# in win7,10,11 etc so this will be continue
But Some "beginner" Pentesters/Red-teamers think C# is not Useful for making Offensive codes which is "wrong mindset"

i can explain why C# Offensive programming is really useful and good for Pentesters/red-teamers etc, for example how you can use Windows programming to AVs/EDRs also how you can use .NET Features for compiling codes in-memory for bypassing AVs also why C# codes still is not in top priority for detecting via AVs and a lot and which is in .net and C# which you have not them in C/C++ very simple and ...

But

for explaining these C#.Net features "step-by-step with details" i use "ChatGPT" to explain much better for you.
so i + "ChatGPT" made our first Video together for you all to "explain technical details" why C# is one of top languages for programming .... ;D👇

#offensivesecurity #chatgpt #csharp #pentesting #redteaming #programming #offensive #Bypassing #antiviruses #edrs #malwares #api #bypass #methods #techniques #unique

Last updated 2 years ago

those Cyber Security guys which called itself or or "just because" they are in university (learning something As [basics ;D more often] or academic things or out-of-date things ;D) and they "did not have any Experience" in Cyber Security Fields (even 1 year) and some of them even did not have any good/unique/new Cyber Security Research or tools/codes (which shared before to public).
and yeah we call them beginner "geniuses" in cyber security lol

Vs

those Cyber Security Guys which they have at least 3-5 years experience of learning real/new/unique things in these fields like or or .

believe me your academic things are "Bullshit" and your instructors did not have updated content , they even don't have good viewpoint for cyber security fields like Penetration test or ... ,more often they don't have any experience of working with Offensive tools like Modern C2 servers, they don't know how you can write Offensive Codes like Writing server/agent (and why should do that) or they don't know how you can writing Offensive codes for bypassing or or other things ... you don't know about these things or a lot other things which you should learn them outside of university "by yourself".

you can learn these things from (with read Articles or Learn Courses which shared Publicly or Privately by and or or ) and you need at least 2-3 years experiences for learn these new things.

Some guys think if you know all tools in Kali linux then you can call yourself or Red-teamer, which is not true "geniuses".
Penetration testing is not about Tools , its about background "concepts" of tools omfg "remember this". (its about logic behind tools)

#pentester #redteamer #securityresearcher #penetrationtesting #redteaming #securityresearch #c2 #avs #edrs #Bypassing #infosec #communities #securityresearchers #pentesters #redteamers #blueteamers

Last updated 2 years ago

CK's Technology News · @CKsTechnologyNews
1534 followers · 31987 posts · Server mastodon.social

Anti-Viruses with Thread Injection Technique + C# Delegate & ETW ( )

damonmohammadbagher.github.io/

#Bypassing #pentesting #redteaming

Last updated 2 years ago

DavidV.TV Social ® · @DavidVTV
86 followers · 13749 posts · Server masthead.social

: | Memory Lane

Pegasus spyware is capable of your phone's and gaining complete to your device - including emails, messages, , photos, video, and your phone's .

youtu.be/G7H9uo3j5FQ

Disclaimer: DavidVTV.com and/or its owners [JustBlameWayne.com] are not affiliates of this provider or referenced image used. this is NOT an Endorsement OR Sponsored (Paid) Promotion...

#microphone #GPS_location #access #security #Bypassing #implications #Saudia_Arabia #spyware #pegasus #ISREALI

Last updated 2 years ago

DavidV.TV Social ® · @DavidVTV
86 followers · 13753 posts · Server masthead.social
DavidV.TV Social ® · @DavidVTV
86 followers · 13753 posts · Server masthead.social
DavidV.TV Social ® · @DavidVTV
86 followers · 13753 posts · Server masthead.social
DavidV.TV Social ® · @DavidVTV
86 followers · 13753 posts · Server masthead.social

| is pages because they’re ‘

“In practice, AMP is harmful to users and to the Web at large,” Brave’s blog post said, before explaining that AMP gives Google even of users’ , users, and can often be than normal web pages. And it that the next version of AMP — so far just called AMP 2.0 — will be even .

theverge.com/2022/4/19/2303277

Disclaimer: DavidV.TV and/or its owners..

#worse #warned #slower #confuses #browsing_habits #more_knowledge #HARMFUL_TO_USERS #amp #google #Bypassing #brave #big_tech

Last updated 2 years ago

DavidV.TV Social ® · @DavidVTV
86 followers · 13753 posts · Server masthead.social

| : The that Threatens Democracy |

Wide Spread ABUSE!?

Pegasus spyware is capable of your phone's and gaining to your - including emails, messages, GPS location, photos, video, and your phone's microphone.

youtu.be/G7H9uo3j5FQ

Disclaimer: DavidV.TV and/or its owners (Tastingtraffic LLC) are not affiliates of this provider or referenced image used and this..

#device #complete_access #security #Bypassing #Spyware_Technology #spyware #pegasus #ISREALI #INTERNATIONAL_TECH_NEWS

Last updated 3 years ago