From 0f49da5f6972cf37a2976e2d727eb2ebd4e504ed Mon Sep 17 00:00:00 2001 From: "Nikhil \"SamratAshok\" Mittal" Date: Fri, 23 Dec 2016 18:48:26 +0530 Subject: [PATCH 1/2] Update README.md --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 51d15b2..abcc978 100644 --- a/README.md +++ b/README.md @@ -98,6 +98,10 @@ A backdoor which can use alternate data streams and Windows Registry to achieve A backdoor which uses well known Debugger trick to execute payload with Sticky keys and Utilman (Windows key + U). +#####Bypass +[Invoke-AmsiBypass](https://github.com/samratashok/nishang/blob/master/Bypass/Invoke-AmsiBypass.ps1) +Implementation of publicly known methods to bypass/avoid AMSI. + #####Client [Out-CHM](https://github.com/samratashok/nishang/blob/master/Client/Out-CHM.ps1) From 1b5aca1a1eb170befccf1d111e8902285d553289 Mon Sep 17 00:00:00 2001 From: "Nikhil \"SamratAshok\" Mittal" Date: Fri, 23 Dec 2016 18:48:50 +0530 Subject: [PATCH 2/2] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index abcc978..3ac3f41 100644 --- a/README.md +++ b/README.md @@ -100,6 +100,7 @@ A backdoor which uses well known Debugger trick to execute payload with Sticky k #####Bypass [Invoke-AmsiBypass](https://github.com/samratashok/nishang/blob/master/Bypass/Invoke-AmsiBypass.ps1) + Implementation of publicly known methods to bypass/avoid AMSI. #####Client