icyguider / PowerChunker

Bypass AMSI via PowerShell by splitting a file into multiple chunks

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

PowerChunker

PowerChunker is tool designed to Bypass AMSI via PowerShell by splitting a file into multiple chunks. In a post on my blog, I discuss how malicious powershell scripts can evade detection by AMSI if they're run line-by-line, or in chunks. I've included Rasta-mouse's AmsiScanBuffer patch as a PoC to demonstrate how PowerChunker can automate this process to make a detected bypass execute without the need for obfuscation.

PowerChunker.py has no dependencies other than python3. The -s,--serve flag can be provided if the user wants to host the attack from the current server. Otherwise, all .ps1 files that are generated by this script must be transfered over to the web server that will serve them.

usage: PowerChunker.py [-h] [-s] [-o stager.ps1] file host

Split a powershell script to evade detection!

positional arguments:
  file                  Name of powershell script to chunk
  host                  Domain Name or IP Address of host that will serve
                        stager

optional arguments:
  -h, --help            show this help message and exit
  -s, --serve           Start HTTP Server to host stager (Optional)
  -o stager.ps1, --out stager.ps1
                        Name of final stager (Optional)

See below for an example usage of the script:

alt text

About

Bypass AMSI via PowerShell by splitting a file into multiple chunks

License:BSD 2-Clause "Simplified" License


Languages

Language:Python 78.4%Language:PowerShell 21.6%