Here are
20 public repositories
matching this topic...
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Updated
Sep 1, 2020
PowerShell
Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
A PowerShell armoury for security guys and girls
Updated
Jul 21, 2021
PowerShell
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
A C/C++ implementation of Microsoft's Antimalware Scan Interface
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Updated
Jun 13, 2021
PowerShell
Miscellaneous Code and Docs
JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
HTTP Server serving obfuscated Powershell Scripts/Payloads
Updated
Jul 3, 2021
PowerShell
Golang implementation of Microsoft Antimalware Scan Interface
🛡️ Convenient .NET Library for Invoking Antimalware Scan Interface (AMSI)
Antimalware Scan Interface for Rust
Updated
Sep 13, 2018
Rust
This is a port of AMSI.fail,i modify the code to make it C# 5 compatible and can be executed on Windows 10 without installing any extra requirements.AMSI.fail itself generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
C# project that Reflectively loads .Net assemblies in memory.
Updated
Nov 10, 2020
PowerShell
Threat detector for Windows 10
Improve this page
Add a description, image, and links to the
amsi
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
amsi
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.