Skip to content

Find what part of the pentesting code/binary is being caught by anti viruses.

License

Notifications You must be signed in to change notification settings

drone911/CodeCloak

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

69 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Code Cloak

Find what part of the pentesting code/binary is being caught by anti viruses.

Why this idea

During my penetration testing class, I discovered that the testing code and binaries I utilized were triggering alerts from Windows Anti-Malware Services. As antivirus programs typically do not specify which parts of the code or binaries are flagged, I inquired with my professor about methods to identify the specific signatures triggering the alerts. His suggestion involved employing a recursive approach to split and search through the code or binary files to pinpoint the flagged sections.

This method is not widely used as YARA rules specify minimum sizes, but it could still give a good starting point.

Screenshots

  1. Landing Page:

Landing Page Desktop View

2. Detections:

Detections Page Desktop View

About

Find what part of the pentesting code/binary is being caught by anti viruses.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published