Dancylove
  • Home
  • General news
    10 TEST TO HELP YOU FIND A career that suits you

    10 TEST TO HELP YOU FIND A career that suits you

    The threshold for human ear sounds. How much can you hear?

    The threshold for human ear sounds. How much can you hear?

    How to fix vcruntime140.dll is Missing Error on Windows

    How to fix vcruntime140.dll is Missing Error on Windows

    A small tool that disables dangerous Windows features

    A small tool that disables dangerous Windows features

    Basic User Mistakes About CPU ???

    Basic User Mistakes About CPU ???

    The world’s largest forum announced the number of daily users for the first time

    The world’s largest forum announced the number of daily users for the first time

    In which, on which, for which, of which is what? Distinguish

    In which, on which, for which, of which is what? Distinguish

    What is look like, look for, look to, be like & How to use

    What is look like, look for, look to, be like & How to use

  • Technology tips
    10 TEST TO HELP YOU FIND A career that suits you

    10 TEST TO HELP YOU FIND A career that suits you

    The threshold for human ear sounds. How much can you hear?

    The threshold for human ear sounds. How much can you hear?

    How to fix vcruntime140.dll is Missing Error on Windows

    How to fix vcruntime140.dll is Missing Error on Windows

    A small tool that disables dangerous Windows features

    A small tool that disables dangerous Windows features

    Basic User Mistakes About CPU ???

    Basic User Mistakes About CPU ???

    The world’s largest forum announced the number of daily users for the first time

    The world’s largest forum announced the number of daily users for the first time

    In which, on which, for which, of which is what? Distinguish

    In which, on which, for which, of which is what? Distinguish

    What is look like, look for, look to, be like & How to use

    What is look like, look for, look to, be like & How to use

  • Software
  • Home
  • General news
    10 TEST TO HELP YOU FIND A career that suits you

    10 TEST TO HELP YOU FIND A career that suits you

    The threshold for human ear sounds. How much can you hear?

    The threshold for human ear sounds. How much can you hear?

    How to fix vcruntime140.dll is Missing Error on Windows

    How to fix vcruntime140.dll is Missing Error on Windows

    A small tool that disables dangerous Windows features

    A small tool that disables dangerous Windows features

    Basic User Mistakes About CPU ???

    Basic User Mistakes About CPU ???

    The world’s largest forum announced the number of daily users for the first time

    The world’s largest forum announced the number of daily users for the first time

    In which, on which, for which, of which is what? Distinguish

    In which, on which, for which, of which is what? Distinguish

    What is look like, look for, look to, be like & How to use

    What is look like, look for, look to, be like & How to use

  • Technology tips
    10 TEST TO HELP YOU FIND A career that suits you

    10 TEST TO HELP YOU FIND A career that suits you

    The threshold for human ear sounds. How much can you hear?

    The threshold for human ear sounds. How much can you hear?

    How to fix vcruntime140.dll is Missing Error on Windows

    How to fix vcruntime140.dll is Missing Error on Windows

    A small tool that disables dangerous Windows features

    A small tool that disables dangerous Windows features

    Basic User Mistakes About CPU ???

    Basic User Mistakes About CPU ???

    The world’s largest forum announced the number of daily users for the first time

    The world’s largest forum announced the number of daily users for the first time

    In which, on which, for which, of which is what? Distinguish

    In which, on which, for which, of which is what? Distinguish

    What is look like, look for, look to, be like & How to use

    What is look like, look for, look to, be like & How to use

  • Software
No Result
View All Result
Dancylove
No Result
View All Result
Home Technology tips

How to hack Bypass AntiVirus on your computer

How to hack Bypass AntiVirus on your computer

by admin
June 7, 2022
in Technology tips
488 5
1
How to hack Bypass AntiVirus on your computer

How to hack Bypass AntiVirus on your computer

740
SHARES
3.5k
VIEWS
Share on FacebookShare on Twitter

Note: This article is for educational purposes only. Please do not do illegal things. Any illegal acts you cause, dancylove will not be responsible for all those acts

Contents

  • 1. InvokeStealth – Tool to help hackers bypass Anti-Virus
  • 2. Install and Use Invoke-Stealth to Bypass AntiVirus

1. InvokeStealth – Tool to help hackers bypass Anti-Virus

Invoke-Stealth is a tool to obfuscate, compress, encrypt, and transform the contents, variables, and strings of code written in PowerShell. This tool helps you to automate the decryption process of any file with different techniques. Not only that, this tool is written in Powershell language and made by author JoelGM. Thus, hackers can easily use beautiful viruses with the .ps1 extension to hack into your computer. Not only that, the method is very simple, just type a few sentences on the Terminal and you can change your own Virus. But before that, I will talk about the main functions of Invoke-Stealth.

The main function of Invoke-Stealth helps you Bypass Antivirus or encrypt code:

  • Chimera: Replace strings and concatenate variables
  • BetterXencyprt: Compression and encryption with random iterations
  • PyFuscation: Obfuscate functions, variables, and parameters
  • PSObfuscation: convert content to Byte and encode with Gzip
  • ReverseB64: encode with base64 and reverse to avoid detection

2. Install and Use Invoke-Stealth to Bypass AntiVirus

To install, open Terminal and enter the following command:

sudo apt install powershell

git clone https://github.com/JoelGMSec/Invoke-Stealth.git

cd Invoke-Stealth

pwsh Invoke-Stealth.ps1

As for the installation on Windows, download the PowerShell language here, then open cmd and enter the following command:

powershell iwr -useb https://darkbyte.net/invoke-stealth.php -outfile Invoke-Stealth.ps1

Note: -outfile you can edit the path to download. For example, if you want to download Invoke-Stealth to the Downloads folder, enter the following: powershell iwr -useb https://darkbyte.net/invoke-stealth.php -outfile C:\Downloads\Invoke-Stealth.ps1

To Bypass Antivirus, I will do the following:

Here I have prepared a BackDoor script written in PowerShell language to test ^^

And I put this file on the virustotal website to scan. So the virus.ps1 file that I just created has been detected as having a virus. If you run this file on your own machine, Windows Defender will eat it immediately. So I will switch to the Invoke-Stealth tool as I introduced above to transform the virus :V. Sounds like a virus genetic modification =)

Here I have modified the virus.ps1 file with the function of replacing strings and variables as I said in the function section. The structure of the command is as follows: pwsh Invoke-Stealth.ps1 <filename .ps1> -technique <function>

After it finished, my virus.ps1 file was mutated as shown in the picture. Now I will try another function and see if it works, then I will try to see if it has Bypass AntiVirus. It looks so confusing :))

I will try the function of obfuscation of variables, functions and parameters!

Thus, my virus.ps1 file has changed into a different type of code. Now scan the virus to see if it has Bypass AntiVirus.

Wow, already Bypass AntiVirus successfully. This way hackers can easily take control of your computer or do anything on your computer!

The article is over so far, I hope you learn something from this article, and I also hope you don’t commit illegal acts, instead, you should study how to prevent and improve the quality of life. Safe and secure for users. Bye Bye ! Have a good day !

>>>  Hack any Wifi network without Crack using Wifiphisher

>>> 17 Website help you train critical thinking

Previous Post

Instructions for using RedTeam Toolkit – Software to find security errors

Next Post

Instructions to review the first message with friends using J2TEAM Security (2022)

admin

admin

Next Post
Instructions to review the first message with friends using J2TEAM Security (2022)

Instructions to review the first message with friends using J2TEAM Security (2022)

Comments 1

  1. Pingback: How to hack the Reset Password feature on the Website to gain User rights - Dancylove

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular

  • How to take advantage of Google Colab as a free VPS

    How to take advantage of Google Colab as a free VPS

    1251 shares
    Share 500 Tweet 313
  • How to fix m.youtube keep showing as mobile version on a PC browser?

    1075 shares
    Share 430 Tweet 269
  • PoC CVE-2021-40444 – Attach Virus to Word File

    740 shares
    Share 296 Tweet 185
  • Install Windows 10 on Google Cloud (updated 03/2021)

    925 shares
    Share 370 Tweet 231
  • 4 super convenient and extremely convenient tips on Windows 10 you may not know

    939 shares
    Share 376 Tweet 235

About

  • Home
  • Contact
  • About
  • Policy

Recent hot posts

  • API Security 101: Injection
  • Tool InstallerFileTakeOver escalates Admin privileges on Windows 10/11
  • PoC CVE-2021-40444 – Attach Virus to Word File
  • DDosify – Website DDoS load testing tool
  • How to install Windows 11 without a Microsoft account with Rufus
July 2022
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Jun    

My blog is a place to share technology tips, best tips. Please follow and support me.

DMCA.com Protection Status

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • General news
  • Technology tips
  • Software

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In