• XSS.stack #1 – первый литературный журнал от юзеров форума

Injection Function! AV Bypass || help

Пожалуйста, обратите внимание, что пользователь заблокирован
If you obfuscate your source code it song affect output binary. Even if you call string sYsoJejaoheJuesjjs, it won't help
No friend!

Strings are obfuscated with com https://github.com/adamyaxley/Obfuscate

And the variables and functions are just with random names! To bypass signatures

but the point is not that since the code is not detected at scan time....

It's just that if you don't have anything useful to say or don't know what you're talking about, just don't say it!"
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Just use direct syscalls and try to avoid process injection. In my case, I had great success with bypassing EDRs such as Sentinel1, CS, ATP etc. DLL sideloading works great too.
Thanks, if you have any article/video/code

it would help me a lot
 
And the variables and functions are just with random names! To bypass signatures
FFS. That was a thing in VB6 or so.
In C/Cpp/Asm variables and functions names are not stored in binary.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх