Bypass Windows Defender Reacts to Quasar and Rubeus AMSI Test with GoInvoker CLR

Bypass Windows Defender Reacts to Quasar and Rubeus AMSI Test with GoInvoker CLR

Description:br In this educational demo, we test how Windows Defender and AMSI respond to two well-known .NET tools — Quasar and Rubeus — when executed through a custom CLR-based loader, GoInvoker.br br The test is performed in a fully updated Windows 11 virtual machine with real-time protection enabled. We compare the original executables to modified loader-based versions and analyze Defender behavior.br br References:br 📄 IBM X-Force Red —br Being a Good CLR Host: Modernizing Offensive .NET Tradecraftbr br 📄 NTT Data Security Research —br Radar Magazine Supplement – July 2024 (PDF)br br Github:br br Free Udemy course:br udemy.comuserkruel-illiothbr br DISCLAIMER:br All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions andor activities related to the material presented in this Youtube channel is entirely YOUR responsibility. br br We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges. br br Support the HexSec Communitybr If you find value in our work and would like to support the HexSec community, you can contribute by making a donation. Your support helps us continue developing innovative and high-quality tools for the cybersecurity and IT community.br br Donate:br ETH: 0x3E79B73e3ce33c6B860425DCB40c6D2f4F2aC508 br BTC: bc1qpex9u7x4a6kj4nf6fee7mz54vsv4th2rj2pt30br br br For more details: br Contact on Telegram: @Hexsecteambr Group on Telegram: @hexsectoolsbr br Stay connected:br Udemy: udemy.


User: Kruel Illioth

Views: 4

Uploaded: 2025-05-17

Duration: 06:17