Skip to content

Commit 7700262

Browse files
authored
Update README.md
1 parent fa8471b commit 7700262

File tree

1 file changed

+32
-15
lines changed

1 file changed

+32
-15
lines changed

README.md

+32-15
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,41 @@
11
# c2-shellcode-py
22
免杀360,火绒的Python-shellcode加载器,可直接生成可执行文件exe
3+
4+
## 2023.4.6更新
5+
6+
**`Bypass.py`运行直接生成exe,还可免杀360,无法免杀火绒,火绒3.28病毒库绕过,3.30号病毒库已收录**
7+
8+
**`BypassAV-浪飒.py`运行直接生成exe,已再次绕过最新火绒,360成功上线,其他杀软状况自测。**
9+
10+
11+
12+
![image-20230406175849221](https://img2023.cnblogs.com/blog/2411575/202304/2411575-20230406180433832-1347029140.png)
13+
14+
![image-20230406180709358](https://img2023.cnblogs.com/blog/2411575/202304/2411575-20230406180710010-930191902.png)
15+
16+
![image-20230406175937624](https://img2023.cnblogs.com/blog/2411575/202304/2411575-20230406180725107-1489772396.png)
17+
18+
## 2023.3.29更新
19+
20+
上传样本过多,导致部分杀毒在打包完毕在长时间后会被记录,请重新运行代码生成及时上线即可
21+
22+
## 2023.3.27更新
23+
24+
没有更改代码,发现**腾讯电脑管家****金山毒霸**也可绕过
25+
26+
![image-20230327210233644](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230327210404487-1102022697.png)
27+
28+
![image-20230327210540922](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230327210539969-230609198.png)
29+
30+
31+
332
## 使用
433

534
CS4.7生成python类型shellcode
635

736
![image-20230323173046659](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230323173046883-891160038.png)
837

9-
保存为payload.py与Bypass.py放在一个目录下,单独运行Bypass.py即可
38+
保存为payload.py与Bypass.py/BypassAV-浪飒放在一个目录下
1039

1140
![image-20230323174256475](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230323174256651-1588728063.png)
1241

@@ -18,22 +47,10 @@ CS4.7生成python类型shellcode
1847

1948
![image-20230323172532350](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230323172532786-689062764.png)
2049

21-
## 360
50+
## 某60
2251

2352
![image-20230323175059233](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230323175059639-1587542681.png)
2453

25-
## 火绒
54+
## 某绒
2655

2756
![image-20230323175351079](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230323175351380-242584426.png)
28-
29-
## 2023.3.27更新
30-
31-
没有更改代码,发现**腾讯电脑管家****金山毒霸**也可绕过
32-
33-
![image-20230327210233644](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230327210404487-1102022697.png)
34-
35-
![image-20230327210540922](https://img2023.cnblogs.com/blog/2411575/202303/2411575-20230327210539969-230609198.png)
36-
37-
## 2023.3.29
38-
39-
上传样本过多,导致部分杀毒在打包完毕在长时间后会被记录,请重新运行代码生成及时上线即可

0 commit comments

Comments
 (0)