From 267ff2bdf797287a50089fb7d08741f717cab5a9 Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 12:25:43 +0800 Subject: [PATCH] Update README.md --- README.md | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index a9a95f6..d1a1807 100644 --- a/README.md +++ b/README.md @@ -72,12 +72,8 @@ The following bypass techniques are implemented in `bypass1.cpp`: ![Tencent Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/tencent_bypass1.png) ## Summary - -Both `test.cpp` and `bypass1.cpp` demonstrate a variety of techniques to bypass modern security mechanisms. These techniques focus on: - -- Evading static and dynamic analysis. -- Avoiding detection by EDR and AV solutions. -- Leveraging stealthy execution methods to blend in with legitimate processes. +test.cpp can bypass tencent,huorong,defender but not 360 because I added an remote injection fucntion on RunTimeBroker.exe +bypass1.cpp can bypass tencent,huorong,360 but not defender > **Disclaimer:** > This repository is for educational and research purposes only. The techniques demonstrated here should not be used for malicious purposes. Always ensure compliance with applicable laws and regulations.