【翻译】各种Payload免杀工具集
原文鏈接
http://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html
感覺直譯成AV規(guī)避框架挺蛋疼.
//————————————————————————————-
主要是針對Msf生產(chǎn)的payload進(jìn)行免殺.不一定要求做到全免殺,至少能夠?qū)δ骋惶囟ǖ腁V進(jìn)行免殺.
0x01 Veil
Python寫的,每月15號會放出新的Payload
https://github.com/Veil-Framework/Veil-Evasion
0x02 AVoid
https://github.com/nccgroup/metasploitavevasion/
0x03 Syringe
https://syringe-antivirus-bypass.googlecode.com
0x04 Shellcodeexec
https://github.com/inquisb/shellcodeexec
0x05 Hypersion
http://nullsecurity.net/tools/
0x06 Crypter.Py
http://home.base.be/%72%68%69%6e%63%6b%78%74/script.zip
0x07 Brute-Force AV Evasion
https://raw.github.com/obscuresec/random/master/GenPayloads.py
0x08 Finding Simple AV Signatures With PowerShell
http://www.obscuresecurity.blogspot.in/2012/12/finding-simple-av-signatures-with.html
專門搞定基于簽名的AV
0x09 Powershell
Psm的繞過AV技巧
http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-powershell-method-using.html
http://pentesterscript.wordpress.com/2013/10/15/get-shell-using-powersploit/
http://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html
0x10 Get Shell Using VB Script
從Msf偷點(diǎn)感染word和excel的小技巧用到你自己的payload中
http://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html
0x11 Ghost Writing ASM
主要是用Metasm來編譯Msf生成的bin,隨便往里面添加垃圾代碼
(話說我用FASM生生,紅傘怎么都?xì) 璓E header啊…)
http://www.pentestgeek.com/2012/01/25/using-metasm-to-avoid-antivirus-detection-ghost-writing-asm
0x12 Different Pivoting Technique To Bypass AV
各種Pivot技巧,
http://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html
http://www.pentestgeek.com/2013/10/23/smbexec-2-0-released/
http://bernardodamele.blogspot.com/2009/12/keimpx-in-action.html
https://code.google.com/p/passing-the-hash/
Metasploit module:- powershell_psexec , psexec_psh , psexec_command
總結(jié)
以上是生活随笔為你收集整理的【翻译】各种Payload免杀工具集的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 微软高级流格式ASF简介
- 下一篇: 贝叶斯分类python代码_机器学习实战