aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorheqnx <root@heqnx.com>2025-06-03 23:28:57 +0300
committerheqnx <root@heqnx.com>2025-06-03 23:28:57 +0300
commit2970d564b506d6adb230a9430eabac5e868e8fbe (patch)
tree7d498adeaaeef5124463367735990af50070d383
parent8dfccb20f6d33d7996ed3395e0efd7e366a3210b (diff)
downloadSharpAMSIGhosting-2970d564b506d6adb230a9430eabac5e868e8fbe.tar.gz
SharpAMSIGhosting-2970d564b506d6adb230a9430eabac5e868e8fbe.zip
updated README
-rw-r--r--README.md12
1 files changed, 3 insertions, 9 deletions
diff --git a/README.md b/README.md
index f37415e..00d83bb 100644
--- a/README.md
+++ b/README.md
@@ -22,14 +22,14 @@ Additional resources and contributions by Andrea Bocchetti can be found on [Pack
- **Visual Studio or MSBuild**: For compiling the C# source code.
- **Git**: To clone the repository.
- **Windows**: Compatible with Windows 10/11
-- **Reflective Loader**: A tool like [`go-assembly-ldr`](https://github.com/heqnx/go-assembly-ldr) or Cobalt Strike to load the assembly reflectively.
+- **Reflective Loader**: A tool like [`go-assembly-ldr`](https://cgit.heqnx.com/go-assembly-ldr) or Cobalt Strike to load the assembly reflectively.
### Steps
- Clone the repository:
```
-PS C:\> git clone https://github.com/heqnx/SharpAMSIGhosting.git
+PS C:\> git clone https://cgit.heqnx.com/SharpAMSIGhosting
PS C:\> cd SharpAMSIGhosting
```
@@ -46,7 +46,7 @@ PS C:\> C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe SharpAMSIGho
The `SharpAMSIGhosting` code must be executed as a reflective assembly to function correctly. This typically involves:
1. Compiling the C# code into an executable or DLL.
-2. Using a reflective loader (e.g., PowerShell, MSBuild, or InstallUtil loader from [`go-assembly-ldr`](https://github.com/heqnx/go-assembly-ldr), or `execute-assembly` from CS) to inject the assembly into memory.
+2. Using a reflective loader (e.g., PowerShell, MSBuild, or InstallUtil loader from [`go-assembly-ldr`](https://cgit.heqnx.com/go-assembly-ldr), or `execute-assembly` from CS) to inject the assembly into memory.
3. Executing the `Main` or `Execute` method to perform the AMSI bypass.
## Notes
@@ -55,10 +55,6 @@ The `SharpAMSIGhosting` code must be executed as a reflective assembly to functi
- **System Requirements**: The target system must have `rpcrt4.dll`.
- **Detection Risk**: While the tool aims to evade AMSI, modern EDR solutions may detect memory manipulation or hooking behavior.
-## Automated Releases
-
-Check the GitHub Releases page for the new release with attached binaries.
-
## License
This project is licensed under the GNU GENERAL PUBLIC LICENSE. See the LICENSE file for details.
@@ -66,5 +62,3 @@ This project is licensed under the GNU GENERAL PUBLIC LICENSE. See the LICENSE f
## Disclaimer
`SharpAMSIGhosting` is provided "as is" without warranty. The author and contributors are not liable for any damages or legal consequences arising from its use. Use responsibly and only in authorized environments.
-
-