NativePayload_ASM3/AsynASM , NativePayload_ASM/AsynASM , Injecting Meterpreter Payload bytes into local Process via Delegation Technique [Technique D] + in-memory with delay Changing RWX to X [Bypassing AVs]
Note: Code was created in [Jan/Feb 2023] and some AVs like (Windows defender with update jan 2023) bypassed by this simple code for more info watch video.
Related Video [NativePayload_AsynASM]: https://www.linkedin.com/posts/damonmohammadbagher_bypassing-redteaming-pentesting-activity-7031685536918458369-U9XY
Related Video [NativePayload_ASM]: https://www.youtube.com/watch?v=T57pWzS59Y8
Usage:
NativePayload_ASM3.exe "meterpreter/cobaltstrike payload"
example: NativePayload_ASM3.exe "fc,48,e8,00,....."
Usage:
NativePayload_AsynASM.exe "meterpreter/cobaltstrike payload"
example: NativePayload_AsynASM.exe "fc,48,e8,00,....."