A simple and easy-to-use anti-virus tool for intranet penetration [no-antivirus fscan, mimikatz, frp, etc.]

Statement: The security tools and projects shared by this public account are all from the Internet and are only for security research and learning. If used for other purposes, the user shall bear all legal and joint liability and has nothing to do with the tool author or this public account.

Tool introduction

A simple intranet penetration tool that is currently free of fscan, mimikatz, frp, elevationstation, bypassuac, and one-click killAV.

Please use In-Swor (x64 version), please replace the exe icon resource for 360 virus reporting qvm20.

Tool usage

Change the loading path under payload.ini and load different functions, such as mimikatz

Anti-kill defender

Free to kill 360

In addition to the fixed functions under the memory execution config, you can also use cs or msf to generate payload.bin (note that x86 is required) for loading and online.

Anti-kill record

2023-8-18 Microstep test in good condition

Sandbox records:

https://s.threatbook.com/report/file/ea24d4dbc1312ad0413736d4632c5cf4d3df189612aa1c52fb511982be463d21

2023-8-05 The shellcode file that updates mimikatz will be killed by 360 Antivirus and undergoes simple processing, and the dat file will undergo simple XOR processing.

2023-8-07 Update the usage of bypassUAC function: change the configuration in payload.ini to ./config/BypassUAC.dat and run BypassUAC.exe

2023-08-28 360. Microstep killing status is good

2023-09-05 360 antivirus check results-------have been sent

2023-09-12 Added one-click killAV, such as 360 Security Guard, 360 Antivirus, Kingsoft Antivirus, Tencent Computer Manager, etc., which will not change the anti-kill feature and use the newly uploaded 2.exe to replace the previous 64-bit loader

download link

https://github.com/snnxyss/In-Swor

digression

How to learn hacking & network security

As long as you like my article today, my private network security learning materials will be shared with you for free. Come and see what is available.

1. Learning roadmap

Insert image description here

There are a lot of things to learn about attack and defense. I have written down the specific things you need to learn in the road map above. If you can complete them, you will have no problem getting a job or taking on a private job.

2. Video tutorials.
Although there are many learning resources on the Internet, they are basically incomplete. This is a video tutorial on network security that I recorded myself. I have accompanying video explanations for every knowledge point in the roadmap above.

The content covers the study of network security laws, network security operations and other security assessments, penetration testing basics, detailed explanations of vulnerabilities, basic computer knowledge, etc. They are all must-know learning contents for getting started with network security.

Insert image description here

(They are all packaged into one piece and cannot be expanded one by one. There are more than 300 episodes in total)

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

3. Technical documents and e-
books are also compiled by me, including my experience and technical points in participating in large-scale network security operations, CTF and digging SRC vulnerabilities. There are more than 200 e-books. Due to the sensitivity of the content, I will not Showed them one by one.

Insert image description here

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

If you also want to learn : Hacking & Network Security SQL Attack and Defense

Get it here:

This is the latest and most comprehensive network security learning material package that I spent several days and nights compiling to share with you for free. It contains the following things:

1. Learning route & career planning

Insert image description here
Insert image description here

2. Full set of system courses & entry to mastery

Insert image description here

3. Hacker e-books & interview materials

Insert image description here

Guess you like

Origin blog.csdn.net/shangguanliubei/article/details/135339741