Quellcode durchsuchen

Update README.md

assume-breach vor 3 Jahren
Ursprung
Commit
29a453eda0
1 geänderte Dateien mit 1 neuen und 1 gelöschten Zeilen
  1. 1 1
      Harriet/README.md

+ 1 - 1
Harriet/README.md

@@ -56,6 +56,6 @@ Fill In The Values As Prompted
 
 **Mitigations**
 
-There are a few issues that you should be aware of. The first is that this will be detected at some point. Eventually, it will wind up on VT or the AV engines will signature it. There are mitigations that you can take to customize it. The first is to change the Virt_Alloc variable in all of the scripts. The second is to change all of the values in the perl scripts. Adding various sleep functions within the scripts can also keep the script from being signatured. The binary that Harriet uses to sign your malware is a Microsoft Office 365 updater. You can switch this out with a different binary and replace the path for your new exe in the scripts. This can help with keeping your malware undetected. 
+There are a few issues that you should be aware of. The first is that this will be detected at some point. Eventually, it will wind up on VT or the AV engines will signature it. There are mitigations that you can take to customize it. The first is to change the Virt_Alloc variable in all of the scripts. The second is to change all of the values in the randomization scripts. Adding various sleep functions within the scripts can also keep the script from being signatured. The binary that Harriet uses to sign your malware is a Microsoft Office 365 updater. You can switch this out with a different binary and replace the path for your new exe in the scripts. This can help with keeping your malware undetected. 
 
 **Enjoy and DON'T UPLOAD TO Virus Total!!!!!**