Simple Trick: Code behavior detected by Anti-virus and Some AVs via Sleep/timer trick in C#
Video: youtube.com/watch?v=hmzKun6eFh

#Bypassing #penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Last updated 2 years ago

Renaud Lifchitz :verified: · @nono2357
245 followers · 838 posts · Server infosec.exchange

RT @Jenaye_fr
Hello everyone ! 👋

I would like to share with you a mindmap (v1) about bypassing AV/EDR.

In Redteam setup, I suggest the manual mode only.

Thanks to @Zabannn for his contribution

Link : github.com/CMEPW/BypassAV

#bypassav #bypassedr #rt

Last updated 2 years ago

KASPERSKY and ...
NativePayload_PE1/PE2 also some New code Which Callback Function API integrated to Delegation Method [Technique D] & Bypassing some AVs, source code available in my Github [github.com/DamonMohammadbagher] but those two new Codes "NativePayload_AsynASM.cs + NativePayload_ASM3.cs" will share in the future but you can see source code in Video ;D

#bypassed #penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Last updated 2 years ago

KASPERSKY again ;D
with Native API you can change Memory very simple and i tested simple c# code to Convert payload before running payload also after running payload with delay so In-memory every 60 secs only once RAW payload will run in memory and this code still needs to test but i did not have any error in Server-side or client-side and commands worked very well but still needs to work on this code (this code just was for test),
btw code was not Detected by Kaspersky so i can say KASPERSKY Bypassed again ;D
anyway or in-memory can help you sometimes ;)

#bypassed #process #inmemory #cobaltstrike #encrypting #obfuscating #penesting #redteaming #bypassav #evasion #redteam #pentest

Last updated 2 years ago

Video: Kaspersky v21.3 vs New C# Code and Bypassed very well

some real sources: some engineers in some Anti-virus Companies say "COME-ON" ;D etc.

Simple Technique to Load Assembly/Bytes into local process (in-memory) via C# Delegation + Native APIs and Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some behavior of code (also change source code) and ...

youtube.com/watch?v=sqyKqiU1ls

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky #redteam #pentest

Last updated 2 years ago

Video: Kaspersky v21.3 vs New C# Code and Bypassed very well

some real sources: some engineers in some Anti-virus Companies say "COME-ON" ;D etc.

Simple Technique to Load Assembly/Bytes into local process (in-memory) via C# Delegation + Native APIs and Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some behavior of code (also change source code) and ...

Source code => lnkd.in/eZEEhfDY
article => lnkd.in/e4PPJe7R

youtube.com/watch?v=sqyKqiU1ls

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky #redteam #pentest

Last updated 2 years ago

Video: Kaspersky v21.3 vs New C# Code and Bypassed very well

some real sources: some engineers in some Anti-virus Companies say "COME-ON" ;D etc.

Simple Technique to Load Assembly/Bytes into local process (in-memory) via C# Delegation + Native APIs and Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some behavior of code (also change source code) and ...

Source code => lnkd.in/eZEEhfDY
article => lnkd.in/e4PPJe7R


youtube.com/watch?v=sqyKqiU1ls

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky #redteam #pentest

Last updated 2 years ago

Two C# Methods and test on Win 11 [v22H2] with last updates.

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies say "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive

Last updated 2 years ago

Two C# Methods vs "Kaspersky cloud security v21.3"
now testing Kaspersky with last update 22/1/2023 and bypassed very well

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies says "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky

Last updated 2 years ago