brother, just a curious question. is it possible for your to come live, i have questions on how to learn code, practice, what to learn, career path many more.
@hexdump13379 күн бұрын
Next year I might do some livestreams, just hard to find the time right now. If you have specific questions, feel free to write at leo95.yt@gmail.com
@AltaBross10 күн бұрын
Bro now this method will get dectecd
@hexdump133710 күн бұрын
Objective of this video is to build understanding regarding AMSI, not much to showcase practical payloads that you can use on real systems. That is outside the scope of the series, as the series is focusing on basic privilege escalation techniques, and not AV evasion, and would deserve its own material, which is, of course, much more complex. Thanks for the feedback however, useful to make the point clear in the comment section!
@eli_the_crypto_guy10 күн бұрын
Then the new thing will be bypassed, there will always be something new and better then that too will be exploited, wash, rinse, repeat.
@Nuru0002 күн бұрын
Я попробую обьяснить кратко: Метод показанный в видео работает, но только для PS 5.1 Windows 10, но немного про оптимизировав данный метод можно добиться обхода amsi для PS 5.1 и PS 7.0 для Windows 10 и Windows 11. 1) обойти ограничения ExecutionPolicy 2) Пропатчить память улучшенным методом из видео заполнения массивом из девяти нулей 3) сохранить сессию как новый контекст (обойти менеджер авторизации)