Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
thomasxm authored Jul 11, 2024
1 parent f575467 commit afc510f
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,8 @@ BOAZ (Bypass, Obfuscate, Adapt, Zero-Trust) evasion was inspired by the concept

BOAZ aims to bypass the before and during execution phases that span signature, heuristic and behavioural-based detection methods. BOAZ supports x64 binary (PE) or raw playload (.bin) as input. It has been tested on separated Window-11 VMs with 14 Desktop AVs. The design of BOAZ evasion is modularised so users can add their own toolset, encoding or new techniques to the framework at will. It is written in both C and C++, and uses Python as the main program to link all modules together.

For students and researchers in offensive security, no advanced programming knowledge or skills are required to use BOAZ to generate undetectable polymorphic samples.

This tool has an alternative use: it can function as a packer or obfuscator.

## Features
Expand Down Expand Up @@ -221,7 +223,8 @@ This project is licensed under the MIT License - see the `LICENSE` file for deta
## Acknowledgments
A special thanks to the researchers and developers whose work has inspired, contributed to, and made this tool possible:
A special thanks to the researchers and developers whose work has inspired, contributed to, and made this tool possible.
All credit goes to the original authors of the techniques and tools:
* [Inceptor - Bypass AV-EDR solutions combining well known techniques](https://github.com/klezVirus/inceptor/blob/main/slides/Inceptor%20-%20Bypass%20AV-EDR%20solutions%20combining%20well%20known%20techniques.pdf)
Expand Down

0 comments on commit afc510f

Please sign in to comment.