video: NativePayload_ITD2, in this v2 of "New Method", our C# code just have Win API imports for [VirtualProtect & FlushInstructionCache] so big change in code behavior also code signature etc, in v2 of this New Mehod we had VirtualAlloc but in this v2.0 we don't have some Apis like Createhread or VirtualAlloc or WriteProcessMemory etc and as you can see Kaspersky v21 Bypassed...
in my eBook my focus is on C# Programming and how can use C# Codes to bypass AVs this is very important to Pentesters / RedTeamers / Blue Teamers to learn programming to make own Codes without using those code which shared in public and my goal in this ebook [Bypassing AVs by C# Programming v2.0] is to share some of my little knowledge to others (first students in my country) then others ....
note: codes will not share here , i will explain them in ebook only ;)
یکی از اهداف من در این کتاب این می باشد که دانشجو تیم قرمز یا آبی و تست نفوذ اتکاش به برنامه نویسی خودش باشد تا کدهای آماده دیگران و با کمی تحقیق و تمرین کد های جدید خود را بسازد و آنتی ویروس ها و ابزارهای دفاعی خود را تست کند {و این کار برای ایرانی جماعت سخت نیست}
https://www.youtube.com/watch?v=3Ctwq6Ema0I
#ebook #redteam #pentesting #blueteam #programming #publishing #csharp #antiviruses #edr #threatdetection #soc #kaspersky #kasperskybypass