Skip to content

Bypass AMSI via PowerShell by splitting a file into multiple chunks

License

Notifications You must be signed in to change notification settings

icyguider/PowerChunker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PowerChunker

PowerChunker is tool designed to Bypass AMSI via PowerShell by splitting a file into multiple chunks. In a post on my blog, I discuss how malicious powershell scripts can evade detection by AMSI if they're run line-by-line, or in chunks. I've included Rasta-mouse's AmsiScanBuffer patch as a PoC to demonstrate how PowerChunker can automate this process to make a detected bypass execute without the need for obfuscation.

PowerChunker.py has no dependencies other than python3. The -s,--serve flag can be provided if the user wants to host the attack from the current server. Otherwise, all .ps1 files that are generated by this script must be transfered over to the web server that will serve them.

usage: PowerChunker.py [-h] [-s] [-o stager.ps1] file host

Split a powershell script to evade detection!

positional arguments:
  file                  Name of powershell script to chunk
  host                  Domain Name or IP Address of host that will serve
                        stager

optional arguments:
  -h, --help            show this help message and exit
  -s, --serve           Start HTTP Server to host stager (Optional)
  -o stager.ps1, --out stager.ps1
                        Name of final stager (Optional)

See below for an example usage of the script:

alt text

About

Bypass AMSI via PowerShell by splitting a file into multiple chunks

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published