-
Notifications
You must be signed in to change notification settings - Fork 792
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows defender flags the monkey as a malware #1289
Comments
Possible solutions: First and foremost we should consider creating an AV testing environment. So far the candidates: Note that test infrastructure can't have access to the internet or else it might submit samples of monkey to vendors which will cause the monkey to get flagged. Signing the monkey binaries:
Create a module for binary obfuscation:
Short term solution: Remove the files |
A list of potential tools to use: |
I think that impacket is the thing that defender most often flags. We can use other projects, like smbprotocol in order to avoid tripping defender. |
Fixed in v2.2.0. Note that some behaviors/plugins may still trigger Windows Defender, but this means it's doing its job. Installation is not impeded, which was the major issue. |
Describe the bug
Monkey binaries are getting flagged on windows, which causes issues during the installation and run phases of the monkey.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The binary shouldn't get flagged
Screenshots
If applicable, add screenshots to help explain your problem.
Machine version (please complete the following information):
The text was updated successfully, but these errors were encountered: