#bypassav

Beware the no quarantine on MacOS apps and binaries downloaded via curl (or wget). Gatekeeper bypass, no quarantine attribute is set. When files are downloaded from the internet in normal fashion they should have the attribute set to enable gatekeeper protection. Bypass! #macos #bypassav #GatekeeperinMacOSX #vulnerability credit to @redcanary redcanary.com/threat-detection

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-02-21

Simple Trick: Code behavior detected by Anti-virus and #Bypassing Some AVs via Sleep/timer trick in C#
Video: youtube.com/watch?v=hmzKun6eFh
#penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-02-02

KASPERSKY #Bypassed and ...
NativePayload_PE1/PE2 also some New code Which Callback Function API integrated to Delegation Method [Technique D] & Bypassing some AVs, source code available in my Github [github.com/DamonMohammadbagher] but those two new Codes "NativePayload_AsynASM.cs + NativePayload_ASM3.cs" will share in the future but you can see source code in Video ;D

#penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-01-31

KASPERSKY #Bypassed again ;D
with Native API you can change #Process Memory very simple and i tested simple c# code to Convert payload #inmemory before running payload also after running payload with delay so In-memory every 60 secs only once RAW payload will run in memory and this code still needs to test but i did not have any error in Server-side or client-side and #Cobaltstrike commands worked very well but still needs to work on this code (this code just was for test),
btw code was not Detected by Kaspersky so i can say KASPERSKY Bypassed again ;D
anyway #Encrypting or #obfuscating in-memory can help you sometimes ;)
#penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-01-28

Video: Kaspersky v21.3 vs New C# Code and Bypassed very well

some real sources: some engineers in some Anti-virus Companies say "COME-ON" ;D etc.

Simple Technique to Load Assembly/Bytes into local process (in-memory) via C# Delegation + Native APIs and Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some behavior of code (also change source code) and ...
youtube.com/watch?v=sqyKqiU1ls

Source code => lnkd.in/eZEEhfDY
article => lnkd.in/e4PPJe7R

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky #redteam #pentest

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-01-27

Two C# Methods and test on Win 11 [v22H2] with last updates.

Simple #Technique to Load Assembly/Bytes into local process (#inmemory) via C# #Delegation + #Native #APIs and #Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some #behavior of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies say "COME-ON", like Kaspersky ;D

note: as #pentester you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as #securityresearcher this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive

Damon Mohammadbagher ✅DamonMohammadbagher@infosec.exchange
2023-01-22

Two C# Methods vs "Kaspersky cloud security v21.3"
now testing Kaspersky with last update 22/1/2023 and bypassed very well

Simple #Technique to Load Assembly/Bytes into local process (#inmemory) via C# #Delegation + #Native #APIs and #Bypassing Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some #behavior of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies says "COME-ON", like Kaspersky ;D

note: as #pentester you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as #securityresearcher this is really fun to find out new method/codes to bypass AVs always ;D

article => linkedin.com/pulse/2-simple-c-

source code => github.com/DamonMohammadbagher

#bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst