🦳
Abdullah AlZahrani
  • Home
  • Bypassing Windows protection mechanisms
    • HTML Smuggling Against VirusTotal
    • Bypass ASR Rule and Dump LSASS
    • Bypass Windows Defender ATP
    • Bypass AVs via Ordinals
    • From Detected to Undetected
    • Dump LSASS By Custom Code
    • Keep Me In Memory
    • Impacket/PsExec & MyPsExec VS Kaspersky
    • PSReadLine History
Powered by GitBook
On this page

Was this helpful?

  1. Bypassing Windows protection mechanisms

Impacket/PsExec & MyPsExec VS Kaspersky

Last updated 3 years ago

Was this helpful?

In some engagement, I faced a machine Kaspersky was installed on it, so I tried to access the machine via but no luck! Because Kaspersky works like a charm. From this point, I made my own PsExec try to bypass Kaspersky.

‌First, I used library because I didn't have time to make something from scratch.

Then I tested the tool on my VM with Kaspersky installed. And guess what? It's working, and I can execute commands on the machine.

The tool may be published in the future, but so far, I have not completed all the features.

Features/ToDo.

  • Execute commands as a specific local, SYSTEM, or domain user.

  • Execute commands via CMD or PowerShell.

  • Commands history.

Last update

- 9/04/2021
Impact/PsExec
the PyPsexec