• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

How to hack Bypass AntiVirus on your computer

AnonyViet by AnonyViet
January 24, 2023
in Security
0

Hello friends, in today’s article I will show you how to hack Bypass Antivirus right on your computer without any difficulty. Listen to this, any fellow who is a pentester must also like this very much, right? ^^. So no more rambling, let’s get to the point!

Join the channel Telegram of the AnonyViet 👉 Link 👈

Note: This article is for educational purposes only. Please do not do illegal things. Any illegal acts you cause, Anonyviet will not be responsible for all such acts

InvokeStealth – Tool to help hackers bypass Anti-Virus

Invoke-Stealth is a tool to obfuscate, compress, encrypt, and transform the contents, variables, and strings of code written in PowerShell. This tool helps you to automate the decryption process of any file with different techniques. Not only that, this tool is written in Powershell language and made by the author JoelGM. Thus, hackers can easily use cute viruses with the tail .ps1 to perform a hack on your computer already. Not only that, the method is very simple, just type a few sentences on the Terminal and you can change your own Virus. But before that, I will talk about the main functions of Invoke-Stealth.

The main function of Invoke-Stealth helps you Bypass Antivirus or encrypt code:

  • Chimera: Replace strings and concatenate variables
  • BetterXencyprt: Compression and encryption with random iterations
  • PyFuscation: Obfuscate functions, variables, and parameters
  • PSObfuscation: convert content to Byte and encode with Gzip
  • ReverseB64: encode with base64 and reverse to avoid detection

Install and Use Invoke-Stealth to Bypass AntiVirus

To install, open Terminal and enter the following command:

sudo apt install powershell

git clone https://github.com/JoelGMSec/Invoke-Stealth.git

cd Invoke-Stealth

pwsh Invoke-Stealth.ps1

If you install it on Windows, download the PowerShell language here then open cmd and enter the following command:

powershell iwr -useb https://darkbyte.net/invoke-stealth.php -outfile Invoke-Stealth.ps1

Note: -outfile You can edit the link to download. For example, if I want to download Invoke-Stealth to the Downloads folder, enter the following:: powershell iwr -useb https://darkbyte.net/invoke-stealth.php -outfile C:\Downloads\Invoke-Stealth.ps1

To Bypass Antivirus, I will do the following:

How to hack Bypass AntiVirus on your computer 7

Here I have prepared a script BackDoor written in PowerShell language for testing ^^

How to hack Bypass AntiVirus on your computer 8

And I put this file on the website virustotal to scan. So file virus.ps1 that I just created has been found to have a virus. If you run this file on your own machine, Windows Defender will eat it immediately. So I will switch to the Invoke-Stealth tool as I introduced above to transform the virus :V. Sounds like a virus genetic modification =)

Bypass AntiVirus

Here I have changed the file virus.ps1 with function of replace strings and variables As I said in the function section. The structure of the command is as follows: pwsh Invoke-Stealth.ps1 <tên file .ps1> -technique <chức năng>

Eg: pwsh Invoke-Stealth.ps1 anonyviet.ps1 -technique ReverseB64

How to hack Bypass AntiVirus on your computer 9

After it completes, the file virus.ps1 has been transformed as shown in the picture. Now I will try another function and see if it works, then I will try to see if it has Bypass AntiVirus. It looks so confusing :))

Bypass AntiVirus Success

I will try the do function shuffling variables, functions, and parameters let’s see how!

How to hack Bypass AntiVirus on your computer 10

Thus, the file virus.ps1 Mine has changed into another piece of code. Now scan the virus to see if it has Bypass AntiVirus

Bypass AntiVirus Success

Wow, already Bypass AntiVirus successfully. This way hackers can easily take control of your computer or do anything on your computer!

The article is over so far, I hope you learn something from this article, and I also hope you don’t commit illegal acts, instead, you should study how to prevent and improve the quality of life. Safe and secure for users. Bye Bye ! Have a good day !

You can read more articles How to identify a computer infected with Virus on Anonyviet

The article achieved: 5/5 – (100 votes)

Tags: AntiVirusBypasscomputerHack
Previous Post

What is a dual VPN and how does it work?

Next Post

Lesson 197: Circular references in Excel

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Lesson 197: Circular references in Excel

Lesson 197: Circular references in Excel

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

How to add application to your favorite bar

How to add application to your favorite bar

August 14, 2025
Wowhay.com – The door opens the world of modern knowledge and network culture

Wowhay.com – The door opens the world of modern knowledge and network culture

August 13, 2025
Instructions on how to fix Screen Time Limited Reached on RoBlox

Instructions on how to fix Screen Time Limited Reached on RoBlox

August 13, 2025
How to install GPT-suns on who do not need the Internet

How to install GPT-suns on who do not need the Internet

August 12, 2025
How to add application to your favorite bar

How to add application to your favorite bar

August 14, 2025
Wowhay.com – The door opens the world of modern knowledge and network culture

Wowhay.com – The door opens the world of modern knowledge and network culture

August 13, 2025
Instructions on how to fix Screen Time Limited Reached on RoBlox

Instructions on how to fix Screen Time Limited Reached on RoBlox

August 13, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to add application to your favorite bar

How to add application to your favorite bar

August 14, 2025
Wowhay.com – The door opens the world of modern knowledge and network culture

Wowhay.com – The door opens the world of modern knowledge and network culture

August 13, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply