Be better than yesterday -
** To utilise a Meterpreter reverse shell code instead, check out the following video:
[ Ссылка ]
This video showcases part 2 of the previously uploaded C# Custom Malware videos to feature how it was possible to bypass the latest Windows Defender with AES shellcode encryption and Dynamic Invoke.
Be sure to check out the part 1 of this video in order to follow through:
[ Ссылка ]
The video provides a walkthrough and guide on how to manually implement D/Invoke into a .CS C# project without having to install the entire SharpSploit library. This can help to reduce unnecessary detection surface of your project, to ensure that only the required D/Invoke functions are created for your project.
Gemini Security Awesome Hacking T-Shirts - Support the channel:
[ Ссылка ]
The references used in the video is listed below:
References and source files for part:
[ Ссылка ]
Dynamic Invoke details and credits:
[ Ссылка ]
Example project of Dynamic Invoke:
[ Ссылка ]
Dynamic Invoke delegates and wrapper functions:
[ Ссылка ]
Timestamp:
00:00 Intro
03:40 Implementation of Dynamic Invoke
08:10 Dynamic Invoke PoC 1 - MessageBox
12:15 Dynamic Invoke PoC 2 - Reverse Shell
Ещё видео!