AntiVirus Evasion Tool (AVET) - Windows exploit executable files.

Overview

AntiVirus Evasion Tool (AVET) is a post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.

 

How to get this tool

To use this tool, please use a method listed below.

In a Linux (Debian OS), run the following command(s).

Download and go into the folder

git clone https://github.com/govolution/avet.git  && cd avet/

 

The installation instruction applies for Kali 64bit and tdm-gcc!

Run the setup script:

./setup.sh

 

Docker

If you are not using Kali or don't want to install Metasploit on your system, you can use the Docker Container instead. The container encapsulates Metasploit and avet and the samples will be created in your current directory. It is also possible to use an graphical text editor like gedit.

 

Building the container:

sudo docker build -t avet:v0.1 .

 

Download directly from the following link:

 

How to execute

Using Python

python3 avet.py

Using Docker:

sudo docker run -it --net=host --env="DISPLAY" --volume="$HOME/.Xauthority:/root/.Xauthority:rw"
  -v $(pwd):/tools/avet/output avet:v0.1 /bin/bash

 

Reference(s):

 

-----

Next steps:

 

This article was contributed by Gavin Dennis from Jamaica. Gavin is a member of the Caribbean CSPA.

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.