-
Notifications
You must be signed in to change notification settings - Fork 380
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can we Bypass Windows Defender ? #12
Comments
My educated guess is: until Microsoft themselves resolve the Zero-Day it will remain undetected by Windows Defender, I'm probably wrong though. You can also read this: https://www.trellix.com/en-sg/about/newsroom/stories/threat-labs/follina-microsoft-office-zero-day-cve-2022-30190.html#:~:text=The%20'Follina'%20zero%2Dday,can%20bypass%20Windows%20Defender%20detection. |
John Hammond already has submitted the fault to the Microsoft team and if the system is up to date windows will surely detect the vulnerability |
@lakshya2207 Ah ok, thanks for letting us know! |
Hi I tried the exploit and i have a question now : Is there a way to change html_payload in the code ? |
@ElizabethHanson1999 I tried it, I tried obfuscating html payload but Windows Defender caught any powershell commands, so it is not effective |
Can we use the malicious word document and bypass Windows Defender ?
The text was updated successfully, but these errors were encountered: