Skip to content

Tool written in python3 to determine where the AV signature is located in a binary/payload

Notifications You must be signed in to change notification settings

aln7/AVSignSeek

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

AVSignSeek

Tool written in python3 to determine where the AV signature is located in a binary/payload

Usage

Zip (with a password) your binary/payload caught by an AV so it won't be detected when placed in an environment protected by an AntiVirus. Launch the tool and specify the zip password and filename in the zip with the -p and -f options (infected/infected.bin by default)

./avsignseek.py zipfile.zip

The tool will drop multiple files on the disk to determine on which pattern the signature is based on. It will obviously generate a lot of AV alerts, might be a good idea to run this on an host with no internet connection.

Once done, the result will be printed in stdout and a file (output.txt by default) containing the result will be generated

Help

Automatically detects AV Signatures

positional arguments:
  zip_file

optional arguments:
  -h, --help       show this help message and exit
  -w SLEEP         waiting time between 2 tests (default: 20)
  -p ZIP_PASSWORD  zip password (default: infected)
  -f FILENAME      file name contained in the zip (default: infected.bin)
  -l LIMIT_SIGN    signature limit (default: 64)
  -d SUBDIV        subdiv per step (default: 4)
  -o OUTPUT_FILE   output_file (default: output.txt)
  -s START         start byte (default: 0)
  -e END           end byte

About

Tool written in python3 to determine where the AV signature is located in a binary/payload

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%