module

Microsoft Windows Defender Evasive Executable

Disclosed
N/A
Created
Mar 19, 2019

Description

This module allows you to generate a Windows EXE that evades against Microsoft
Windows Defender. Multiple techniques such as shellcode encryption, source code
obfuscation, Metasm, and anti-emulation are used to achieve this.

For best results, please try to use payloads that use a more secure channel
such as HTTPS or RC4 in order to avoid the payload network traffic getting
caught by antivirus better.

Author

Platform

Windows

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use evasion/windows/windows_defender_exe
msf evasion(windows_defender_exe) > show actions
...actions...
msf evasion(windows_defender_exe) > set ACTION < action-name >
msf evasion(windows_defender_exe) > show options
...show and set options...
msf evasion(windows_defender_exe) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.