Releases: yinsel/BypassAV
Releases · yinsel/BypassAV
1.6
05 Mar 05:28
Compare
Sorry, something went wrong.
No results found
更新详情:
集成SysWhispers3的间接syscall,绕过R3层敏感函数的Hook
更改执行权限为RWX,以正常使用SGN
MD5: 83e51c4829e5d0e1705785529f8cfc9f
在使用过程中如遇到问题欢迎提issue!
1.5
11 Jan 07:01
Compare
Sorry, something went wrong.
No results found
更新详情:
添加阻止amsi.dll的加载,以绕过Defender针对.net程序集加载的扫描
参考思路:https://github.com/Shrfnt77/AmsiBypass
注:如使用donut转换.net程序集,请添加-b:1选项以关闭Patch AMSI,该行为已被Defender标记。
修改执行时的内存权限为RX,暂不支持使用sgn编码
更换原始文件为Postman.exe
原始文件:571282838c1b82121187d439c7899482(MD5)
Patch:a5bf6e35c05b169d378d6b5ee72f2dfc(MD5)
1.4
18 Oct 15:20
Compare
Sorry, something went wrong.
No results found
更换x64位白文件,更新图标资源过QVM
新增x32位
x64:HuoRong.exe 8c8c2be95cd381a1165f3175b325ea93(MD5)
x32:HrASPinTile.exe c99b126fa023fb9d0b6ff70e736a2f9a(MD5)
1.3
14 Aug 02:23
Compare
Sorry, something went wrong.
No results found
1.白文件来源于wps,且为32位,请使用32位的shellcode
2.最低支持win 2008
Hash:
wps.exe(patch)
sha256: BA60F9D967D4924C115AAA43E84F27D9B79AB226ACE4BC6FC0B82354D72C7DF2
ksolaunch.exe(原始白文件)
sha256: 4F6A7D54DA75D19CFF5EDE620E8657CEAF9F1609E18C9074329D8DA90846382A
1.2
08 Aug 01:39
Compare
Sorry, something went wrong.
No results found
更换patch的白文件(WeChat.exe已被360标记)
修复在win 2008上的崩溃问题
1.1
07 Aug 04:20
Compare
Sorry, something went wrong.
No results found
1.0
07 Aug 03:04
Compare
Sorry, something went wrong.
No results found
对patch的shellcode进行sgn编码,采用动态解密的方式运行