https://github.com/damonmohammadbagher/nativepayload_pe1
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
https://github.com/damonmohammadbagher/nativepayload_pe1
antivirus assembly blueteaming bypass bypass-antivirus bypassing injecting injecting-meterpreter-payload inmemory pentest pentesting redteam redteaming
Last synced: about 2 months ago
JSON representation
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
- Host: GitHub
- URL: https://github.com/damonmohammadbagher/nativepayload_pe1
- Owner: DamonMohammadbagher
- Created: 2023-01-20T08:21:17.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-06-06T11:08:54.000Z (about 2 years ago)
- Last Synced: 2025-04-19T17:16:42.442Z (2 months ago)
- Topics: antivirus, assembly, blueteaming, bypass, bypass-antivirus, bypassing, injecting, injecting-meterpreter-payload, inmemory, pentest, pentesting, redteam, redteaming
- Language: C#
- Homepage:
- Size: 2.69 MB
- Stars: 58
- Watchers: 1
- Forks: 15
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# NativePayload_PE1/PE2
### NativePayload_PE1 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both), simple Technique to bypass some Anti-viruses.Note: tested on WIN11 + WinDefender [update 2023/1/25] (bypassed)
Note: tested on WIN10 + WinDefender [update 2023/1/10] (bypassed)
Note: tested on WIN10 + Kaspersky cloud security v21.3 [update 2023/1/22] (bypassed)
### Some Real Sources: some engineers in anti-virus companies say "COME-ON", like Kaspersky ;)
#### Note: "as Security Researcher this was not my first time to bypass all Anti-viruses (or almost all of them ;D) but this one really was fun more than other methods which i have done in the past."
Simple Technique to Load Assembly/Bytes into local process (in-memory) via C# Delegation + Native APIs and Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some behavior of code (also change source code) and ...
note: as pentester you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as security researcher this is really fun to find out new method/codes to bypass AVs always ;D
Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX ;D
#### Note: so in my opinion playing with R W X to X or sometimes to RX or (both) will help you to avoid get red-flag via AVs, so changing default + delays will help you to confuse AVs sometimes.
### NativePayload_PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X only, simple Technique to bypass some Anti-viruses.
Note: .NET 4.0 or 4.5 Tested
Article: https://www.linkedin.com/pulse/2-simple-c-techniques-bypassing-anti-virus-damon-mohammadbagher/
Article: https://damonmohammadbagher.github.io/Posts/22Jan2023x.html
Video1 [NativePayload_PE2.cs and NativePaylod_AsynASM.cs] => https://www.youtube.com/watch?v=T57pWzS59Y8
Video2 [NativePayload_PE3.cs] => https://www.youtube.com/watch?v=sqyKqiU1lsE
Video3 [New] [NativePaylod_AsynASM.cs] => https://www.linkedin.com/posts/damonmohammadbagher_bypassing-redteaming-pentesting-activity-7031685536918458369-U9XY
Usage:
NativePayload_PE1.exe "meterpreter/cobaltstrike payload"
example: NativePayload_PE1.exe "fc,48,e8,00,....."
Usage:
NativePayload_PE2.exe "meterpreter/cobaltstrike payload"
example: NativePayload_PE2.exe "fc,48,e8,00,....."### NativePayload_PE1 steps [Win11]

### NativePayload_PE2 steps [Win11]

---------------------------
### NativePayload_PE1 steps [Win10]

### NativePayload_PE1 steps [Win10]

### NativePayload_PE1 steps [Win10]

-------------------------### NativePayload_PE2 steps [Win10]
### NativePayload_PE2 vs ETW tools

--------------------------### NativePayload_PE1 vs Kaspersky v21.3 (bypassed)

### NativePayload_PE1 vs Kaspersky v21.3 (bypassed)

### NativePayload_PE2 vs Kaspersky v21.3 (bypassed)
