-
Notifications
You must be signed in to change notification settings - Fork 222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detected By AV (Kaspersky, Avira) #11
Comments
Static scan or during execution? |
Without scan or execution, i just copy payload.exe on target PC kaspersky detected it. |
What injection method did you use? |
Thread Hijacking (Shellcode Arch: x86, OS arch: x86) |
Thank you for your feedback I' ll check and get back to you |
checked your claim and it is true, I will issue a relative update to solve the issue. |
Thank you 😀 |
It has been reported that the produced backdoor is no more undetectable from the majority of the AV solutions, which is indeed true and which is something I expected by the time that the software is getting more and more 'popular'. As a temporary solution I advise you to use a C# obfuscator on the produced executable. In my case, I used babel for net (http://www.babelfor.net/) with a great success for the majority of AV’s (including Kaspersky, Avast etc.). |
No description provided.
The text was updated successfully, but these errors were encountered: