How To Bypass Windows Defender with Nim Reverse Shell

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ก.ย. 2024
  • Is it possible to bypass windows defender and elastic security at the same time with a nim written reverse shell?
    The best purple teaming series on youtube with real hands on learning for everyone!
    For educational purposes only!
    Subscribe and like for more!
    Connect with me on linkedin: / howard-mukanda-24503144
    Follow me on twitter: / lahilabs
    A simple reverse shell written in Nim that bypasses Windows Defender detection, find it here: github.com/Sn1... Connect and Direct Message me on Linkedin: / howard-mukanda-24503144

ความคิดเห็น • 25

  • @tonyfernandes216
    @tonyfernandes216 ปีที่แล้ว +5

    brilliant work mate, love to see more video about windows defender bypass and threat hunting in Elastic search, Wazu.

  • @Ydt-cd8xw
    @Ydt-cd8xw 6 หลายเดือนก่อน

    mate this was exactly what i was looking for. thank you!!!

  • @timecop1983Two
    @timecop1983Two 2 หลายเดือนก่อน

    amazing buddy never give up

  • @hamza3524
    @hamza3524 23 วันที่ผ่านมา

    Thanks you, amazing video! One more thing, it is normal that after the exe execution, defender detect the malware and save the malware signature and after that you cannot execute the file even if you remake another file with nim? I though nim was there to bypass defender everytime.

  • @aviwemusa6109
    @aviwemusa6109 6 หลายเดือนก่อน

    How to implement this if my target is my remote (EC2 instance), do I put my Internet public IP on V1 since my Kali is within VMware on my Ubuntu?

  • @fokyewtoob8835
    @fokyewtoob8835 ปีที่แล้ว

    Dope content man. Actually makes me open to trying out blue even though I’m red for life

  • @station0x
    @station0x 11 หลายเดือนก่อน

    how to setup elastic with defender? can u plz tell me

  • @RaGhav363
    @RaGhav363 11 หลายเดือนก่อน

    Don't close any function of Microsoft defender. And add some AVs IDS firewall on top of it and then bypass it

  • @neon_Nomad
    @neon_Nomad ปีที่แล้ว +1

    Exactly why i use simple wall

  • @anonymousperson45152
    @anonymousperson45152 ปีที่แล้ว +1

    nice vid bro

  • @gabrielconsec
    @gabrielconsec ปีที่แล้ว

    I've seen some malware written in D. Languages ​​such as Carbon, Zig, Haxe can be used. Could an AI help in these cases of detecting unconventional codes?

  • @hiddengo3232
    @hiddengo3232 ปีที่แล้ว

    how to bypass edr

  • @umarmukthar1965
    @umarmukthar1965 ปีที่แล้ว

    powershell not working ?

    • @ITSecurityLabs
      @ITSecurityLabs  ปีที่แล้ว

      No, powershell still works!

    • @umarmukthar1965
      @umarmukthar1965 ปีที่แล้ว

      @@ITSecurityLabs bro stable powershell connection any tools bypass in windows defender

    • @umarmukthar1965
      @umarmukthar1965 ปีที่แล้ว

      @@ITSecurityLabs but this tool working 💯

  • @abdullahabushaqra8256
    @abdullahabushaqra8256 5 หลายเดือนก่อน

    sorry ,but windows definder detect it!!!

  • @RaGhav363
    @RaGhav363 11 หลายเดือนก่อน

    This is of no use I tell you that. Because he disabled half of the windows difender functions

    • @ITSecurityLabs
      @ITSecurityLabs  11 หลายเดือนก่อน +1

      Please tell me more. You mean disabling automatic sample submission? Because that’s all I disabled. Maybe you mean since it’s not domain joined and I have no app locker rules and powershell is not constrained? I genuinely want to know what you mean. I am learning as well and if there is a better way, I want that