Skip to content

NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.

License

Notifications You must be signed in to change notification settings

anonymous300502/Nuke-AMSI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

banner
The AMSI Nuke Script is a PowerShell-based utility designed to modify the Anti-Malware Scan Interface (AMSI) in running PowerShell processes. This script exploits Windows API functions to alter the memory of the amsi.dll, effectively disabling its malware scanning capabilities. It serves as an educational tool for security researchers and penetration testers to understand AMSI's role in malware defense and the implications of circumventing such mechanisms.

Concepts utilized

  • Anti-Malware Scan Interface (AMSI) : The Windows Antimalware Scan Interface (AMSI) is a pivotal component in Microsoft’s security architecture, designed to enhance the detection of malicious scripts and behaviors by providing applications and services with a standardized interface to request content scans. As cyber threats evolve, so do the techniques employed by attackers to evade such defenses.

    AMSI in action when it catches a malicious script being executed

    Amsi in action

  • Windows API Functions: Utilized to manipulate process memory and load dynamic link libraries (NTDll.dll & Kernel32.dll). Functions include NtOpenProcess, NtWriteVirtualMemory, VirtualProtectEx, and others.

Key Features

  • Direct Memory Manipulation: NukeAMSI utilizes direct memory manipulation techniques to disable AMSI, leveraging the ntdll library and other critical Windows APIs. This ensures that AMSI is effectively bypassed without raising alerts or triggering additional security measures.

  • Stealth Operations: The tool operates in-memory, meaning it leaves no trace on disk. This makes it particularly useful in scenarios where maintaining operational security is paramount.

Technical Breakdown

NukeAMSI uses several advanced techniques to achieve its goals:

  • Process Injection: By injecting code into the memory space of the PowerShell process, NukeAMSI can alter the behavior of critical security functions.

  • Utilization of NTDLL: The script makes use of ntdll, a core Windows library, to access low-level system functions. This allows NukeAMSI to manipulate the system's memory directly, making its operations more effective and harder to detect.

  • Advanced Error Handling: NukeAMSI includes robust error handling to ensure smooth operation even in complex environments. It carefully checks for and handles potential failures, reducing the likelihood of detection or script failure.

Usage Steps

  1. First lets try running mimikatz in our powershell shell mimikatz amsi trigger As we can see amsi Triggered.

  2. Now, let's run our tool You will be prompted to confirm your intent before the script proceeds to neutralize AMSI within the session. Running nukeamsi

  3. Now we can run mimikatz without worrying about windows defender bothering us. nukeamsi2

Conclusion

NukeAMSI represents the cutting edge of AMSI bypass techniques, offering a powerful, reliable, and stealthy solution for professionals who need to execute scripts in environments where AMSI is active. Whether you're conducting penetration testing, research, or learning more about Windows security internals, NukeAMSI provides the tools you need to operate effectively and securely.

Note: This tool is intended for *educational purposes only. It should be used responsibly and in compliance with all relevant laws and regulations. Unauthorized use of this tool on systems you do not own or have explicit permission to test can result in severe legal consequences.

About

NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published