githubEdit

Defender Antivirus

Defender Antivirus

Compile the Artifact kit

$ ./build.sh pipe VirtualAlloc 277492 5 false false /mnt/c/Tools/cobaltstrike/artifacts

Compile the resource kit

$ ./build.sh /mnt/c/Tools/cobaltstrike/resources

Verify if the payload is AV Safe

PS> C:\Tools\ThreatCheck\ThreatCheck\bin\Debug\ThreatCheck.exe -f C:\Payloads\smb_x64.svc.exe
PS> C:\Tools\ThreatCheck\ThreatCheck\bin\Debug\ThreatCheck.exe -f C:\Payloads\http_x64.ps1 -e AMSI

Load the CNA file:

Cobalt Strike > Script Manager > Load_ and select the CNA

THEN

Use Payloads > Windows Stageless Generate All Payloads to replace all of your payloads in `C:\Payloads`

Disable AMSI in Malleable C2 profile

Right above the http-get block, add the following:

Verify the modified C2 profile

Creating custom C2 profiles

Note: amsi_disable only applies to powerpick, execute-assembly and psinject. It does not apply to the powershell command.

Behaviour Detections (change default process for fork & run)

Change the default process for psexec

Disable Defender from local powershell session

AMSI bypass

InjectAMSIBypass BOF

https://github.com/boku7/injectAmsiBypass

Last updated