Submitted URL: https://protect-us.mimecast.com/s/KxwHCNknZRI0EGx8sVlOWO?domain=nam11.safelinks.protection.outlook.com
Effective URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Submission: On September 22 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 3 domains to perform 10 HTTP transactions. The main IP is 185.199.110.153, located in United States and belongs to FASTLY, US. The main domain is 0x00-0x00.github.io.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on May 6th 2020. Valid for: 2 years.
This is the only time 0x00-0x00.github.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2 205.139.111.117 3561 (CENTURYLI...)
1 1 104.47.58.156 8075 (MICROSOFT...)
10 185.199.110.153 54113 (FASTLY)
10 1
Apex Domain
Subdomains
Transfer
10 github.io
0x00-0x00.github.io
253 KB
2 mimecast.com
protect-us.mimecast.com
3 KB
1 outlook.com
nam11.safelinks.protection.outlook.com
622 B
10 3
Domain Requested by
10 0x00-0x00.github.io 0x00-0x00.github.io
2 protect-us.mimecast.com 2 redirects
1 nam11.safelinks.protection.outlook.com 1 redirects
10 3

This site contains links to these domains. Also see Links.

Domain
www.cyberark.com
github.com
www.twitter.com
Subject Issuer Validity Valid
www.github.com
DigiCert SHA2 High Assurance Server CA
2020-05-06 -
2022-04-14
2 years crt.sh

This page contains 1 frames:

Primary Page: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Frame ID: 9DECD21E7CB07A03DAE64C97A9E2F7FA
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

How to bypass AMSI and execute ANY malicious Powershell code | zc00l blog

Page URL History Show full URLs

  1. https://protect-us.mimecast.com/s/KxwHCNknZRI0EGx8sVlOWO?domain=nam11.safelinks.protection.outlook.com HTTP 307
    https://protect-us.mimecast.com/redirect/eNqtVmlz27YW_SsezjifTBk7AU_TF1m2G3ciZ7ETv7bqeLBcSoy5laDipeP_3kvKTuw... HTTP 307
    https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2F0x00-0x00.github.io%2Fresearch%2F2018%2F10%2F28%2FHow-to-... HTTP 302
    https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <!-- Begin Jekyll SEO tag

Overall confidence: 100%
Detected patterns
  • ^https?://[^/]+\.github\.io

Page Statistics

10
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

1
IPs

1
Countries

253 kB
Transfer

280 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://protect-us.mimecast.com/s/KxwHCNknZRI0EGx8sVlOWO?domain=nam11.safelinks.protection.outlook.com HTTP 307
    https://protect-us.mimecast.com/redirect/eNqtVmlz27YW_SsezjifTBk7AU_TF1m2G3ciZ7ETv7bqeLBcSoy5laDipeP_3kvKTuwk7_VLtEC4Ky8OLg70d9L5tk_2ElvCta0DdBN_00LXv3DlGj41N7buJ76pkp2kbHyyR3aSDjwUbd8XFSR7VHHGuVRKEzLYMBXbSWzfW78q6rzBzH8v7uUK6j4ukr0_UJMXJZzYClBcJK4JN5P-ul8kO4skriwdtYE56SS-AKzSzDhGjQfgzDtHg7bM5Ki14iGKSTXGGck8yTMuHHHCSqyLSKG4UOBcEIRC5g0DQa3MBITMA8s909IJhSmpgjFfFeSYLOeM4dq4hpyZQDKtJZM8oyI3ximjRueuafrTH10AwnuGOzFm7AHB2W1LW9Sb1Ra3g4FyYcjdznfhXPXVUzg9Z0R5wwWlElejpXQOBNZJnZZGC0WpEBro13By5TNNtVJUegs5oZkWWnNJjM2ksGACAyAZ08YrowMzGQJkKOhcZjIL2RM4paM6h1xRYUwmrcgJB8qEIICip_R7cP6YAr6FExEqH6PJqSbsWzT7ztaxKmIsmnoCDyGfUZXC5FRwLM4FQkPuclBBUuBCC0ocrkobAeprVIWggHudaZKbIL1kwnLPTRBGswBaggtUWUe8E8CczTxlTGqO3eFyD4Q-QXVQCcQBOHZeLkALS2TOgEipgjP591D9MQU8RrWCGO0SFrtd7jVjaezX2GHhacNSKe_-vEM2CQXyyEA8xzVKbRGSPcEFziyyTDJ7fzrNxFQwikY7-s1W4C_fv3u1UeBmoG7qPYqxsnGFktS54lxl3iuAXBis1yNleEN8yJX3VgCewzFlrEOHEVULZfPXuqhfrGzXFfGqKMvCVvGe8eLafUSvd4d7W4d1D12LLrD1Zt21JWydga1wiP3WWRPszVa6xQijW285BvZVP2_WNa4pWUcMrChB7cC0XzgRl1-0xSNKrB86bvpAxVuzkYpHBKGyRTma_4WpR-_QVCNXDM3xlXUDP8QBcckUyYhmlG4g-VLd52L-H0RfFfavro-q-h8eRTtaVTZBsp8wSSYbel81sd88Ax9GJw6q3jIxuW-50rr7FHcb8E-agHdTQohGuWhx-jgj6qq4HNaf_DR7Sd68Y2S-L6jE5j5g-5k4PDIHmZGKz46MOlBTZl48cZsgOG0XGJm0XRMmzbovm-ZyKODnIfWmpj5i-qEjiGEMCQLfeBzRvu5KtKz6vo17i93FLiajdBJtDmVRX8YhZw9jgz_OvNj9DwY-H8O2-XSbHeGHXBOSDsNkWfSrtZsUDWo7iGA7v8IpI1TjDyXDfJi9bK7SvkndTWtjTKfz0-MUWyk9vAa_7iGdnvyWVrYsfNGsY9o2V9DFFZRl6hHQ4UopnwXb2-dEbGczQnH4vOfbgny7p-jgqeUytxnBWxExcCFw7LhgspBzZO8hkaGO28xZp3kuRAbGM2pzpUgAalXIhmfdfxXPVGY4UZwaZvAsD8b39WXdXNU4Ozs_at0vv0fHg4abX8-PPzbFfCauXn2cXs0PpsWr2a9vB90HVq7nt8eDvH9WHKvjS7qy51eD_N8Ps2M1r8k2P8CEFO_uZ3Fcs52f__K7wzvrt5N-__TN8lC__yuP-x_2t9n-UdfR5bHIpq9v5QdLsiVGPxv2ofsE4flw9mGgsOWFT-FiHQm9wDv44lPAMaX04gvbXWw6Bh1w_kAdKfZxKjPFlSBiZJLleuze07cvy-sQbl8X5_Pm5PXt7B1VxVu0ewxtKuj85hw8YdMOlhvyvG-0dB0nA497Gzf_9O7-AbAVCYo HTTP 307
    https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2F0x00-0x00.github.io%2Fresearch%2F2018%2F10%2F28%2FHow-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html&data=04%7C01%7Cmpeloquin%40harriswilliams.com%7Cc1a35fa70952434bdd3708d97df354a4%7C91b3a7bab83f447e9c21af660de1a6d7%7C0%7C0%7C637679306319296217%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=aMWGZb5a4YNtBSPgE8UqfsBVB%2BFrr1gI47AOz5Va07g%3D&reserved=0 HTTP 302
    https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
0x00-0x00.github.io/research/2018/10/28/
Redirect Chain
  • https://protect-us.mimecast.com/s/KxwHCNknZRI0EGx8sVlOWO?domain=nam11.safelinks.protection.outlook.com
  • https://protect-us.mimecast.com/redirect/eNqtVmlz27YW_SsezjifTBk7AU_TF1m2G3ciZ7ETv7bqeLBcSoy5laDipeP_3kvKTuwk7_VLtEC4Ky8OLg70d9L5tk_2ElvCta0DdBN_00LXv3DlGj41N7buJ76pkp2kbHyyR3aSDjwUbd8XFSR7VHHGuVRK...
  • https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2F0x00-0x00.github.io%2Fresearch%2F2018%2F10%2F28%2FHow-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html&data=04%7C01%7C...
  • https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
27 KB
9 KB
Document
General
Full URL
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
db5e627a81ed8ca5db113392ff1076021b06d09088f3267fe6789c9642e98ad6
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:method
GET
:authority
0x00-0x00.github.io
:scheme
https
:path
/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

server
GitHub.com
content-type
text/html; charset=utf-8
permissions-policy
interest-cohort=()
strict-transport-security
max-age=31556952
last-modified
Wed, 17 Jun 2020 15:20:12 GMT
access-control-allow-origin
*
etag
W/"5eea34ac-6bbc"
expires
Wed, 22 Sep 2021 18:51:28 GMT
cache-control
max-age=600
content-encoding
gzip
x-proxy-cache
MISS
x-github-request-id
8C34:35B1:212A5A:226FE2:614B78D8
accept-ranges
bytes
date
Wed, 22 Sep 2021 18:41:31 GMT
via
1.1 varnish
age
3
x-served-by
cache-hhn4054-HHN
x-cache
HIT
x-cache-hits
1
x-timer
S1632336092.506155,VS0,VE1
vary
Accept-Encoding
x-fastly-request-id
fbbe65c1ae7684affc32f0447db4d76c7fb7d796
content-length
8483

Redirect headers

Cache-Control
private
Content-Type
text/html; charset=utf-8
Location
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Server
Microsoft-IIS/10.0
X-AspNetMvc-Version
4.0
X-SL-GetUrlReputation-Verdict
Good
X-SL-UrlRepTTL
30
X-Robots-Tag
noindex, nofollow
X-AspNet-Version
4.0.30319
X-ServerName
BN8NAM11WS018
X-ServerVersion
15.20.4544.013
X-ServerLat
59
X-Powered-By
ASP.NET
X-Content-Type-Options
nosniff
X-UA-Compatible
IE=Edge
Date
Wed, 22 Sep 2021 18:41:31 GMT
Connection
close
Content-Length
230
main.css
0x00-0x00.github.io/assets/
7 KB
2 KB
Stylesheet
General
Full URL
https://0x00-0x00.github.io/assets/main.css
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
f861c07e386d770d235e0a7d5674e3b851103960f1b675d5ac614b01f881e02e
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/main.css
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
e4b96f64b9aec069ec8356456014853ad90dd212
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"5eea34ac-1b46"
age
3
x-cache
HIT
content-length
1861
x-served-by
cache-hhn4054-HHN
access-control-allow-origin
*
last-modified
Wed, 17 Jun 2020 15:20:12 GMT
server
GitHub.com
x-github-request-id
BCDA:31A0:E0C749:E7DF93:614B78D8
x-timer
S1632336092.536961,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Wed, 22 Sep 2021 18:51:28 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
amsi_01.JPG
0x00-0x00.github.io/assets/
23 KB
23 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_01.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
c3cfdfa23aaa9bbd046d124b97b20243014b115c1528edceebfe9ef6527002f2
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_01.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
0cb86800ced3030826ff859b38cbba79ce92f9d0
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-5cd5"
age
3
x-cache
HIT
content-length
23765
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
F868:8B19:B5130D:BABE61:614B7055
x-timer
S1632336092.537067,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
amsi_02.JPG
0x00-0x00.github.io/assets/
21 KB
21 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_02.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
5b103747c64980bbfd436b11c8fa2bdfd8560211692d65de2a881ecee7d27c4a
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_02.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
3095bf19e370df654eac7005528bd704a706f5f4
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-52f4"
age
3
x-cache
HIT
content-length
21236
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
2378:DE3B:672C0F:6C5DDC:614B7055
x-timer
S1632336092.537779,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
amsi_03.JPG
0x00-0x00.github.io/assets/
12 KB
13 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_03.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
b91f995e7e225eda0d06ca68fde19c64ce53bc8dbf8710b7fa6498cd8b6814ac
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_03.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
a1d4a8912e8fc9729fddc5bf0f5c69ea50600d0c
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-315c"
age
3
x-cache
HIT
content-length
12636
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
8758:E4B9:EB221A:F25C7C:614B7055
x-timer
S1632336092.538499,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
amsi_04.JPG
0x00-0x00.github.io/assets/
18 KB
18 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_04.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
fb130a57f4d5a3e62a12fdb83e2b707a71ca077b80065f463147b8ee996edfe6
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_04.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
5e79daf6c79be0e690a51154d26a37884ce4e693
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-4660"
age
3
x-cache
HIT
content-length
18016
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
E4EE:319F:6CC04D:71F95F:614B7055
x-timer
S1632336092.538542,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
amsi_05.JPG
0x00-0x00.github.io/assets/
19 KB
19 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_05.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
55942793c4789f828655418fa3864a1d8a10ad49263706e24b1e5f3cd9a7f027
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_05.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
f6d4ef621597f5c714958f8079ccb60cb990c6d0
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-4b9c"
age
3
x-cache
HIT
content-length
19356
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
4510:E4B8:613764:665260:614B7055
x-timer
S1632336092.538547,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
amsi_06.JPG
0x00-0x00.github.io/assets/
38 KB
38 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_06.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
548a092e1a3d7dbce81a5f9135e5f30c6178c6ef01258fbad5dae784241b9af7
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_06.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
02342fc798739a4f8672b0d694e671469bb93aa8
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-97f9"
age
3
x-cache
HIT
content-length
38905
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
EEC0:A3DC:8B46C3:8F6A81:614B7055
x-timer
S1632336092.538609,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
amsi_07.JPG
0x00-0x00.github.io/assets/
106 KB
106 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_07.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
6647ee6af809d0e2bd4bdc2cc1ba61213e969850fe1106417c7b49ca5a68773d
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/amsi_07.JPG
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
4e1fc37515a0d5c4dbe61127ac55a8eca763c7dc
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"5eea34a7-1a71e"
age
3
x-cache
HIT
content-length
108318
x-served-by
cache-hhn4054-HHN
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
171A:A7EE:6B2984:705849:614B7055
x-timer
S1632336092.538620,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
expires
Wed, 22 Sep 2021 18:15:09 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
minima-social-icons.svg
0x00-0x00.github.io/assets/
10 KB
4 KB
Other
General
Full URL
https://0x00-0x00.github.io/assets/minima-social-icons.svg
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.110.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-110-153.github.com
Software
GitHub.com /
Resource Hash
39f87ca832d235ede52f66a4d7ae03d050e6a8b4e1ceba6a5b646fd43ee76223
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/minima-social-icons.svg
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
same-origin
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
0x00-0x00.github.io
referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-fastly-request-id
a14eb5e70c2e025ffe31ba362e98ec5e15f65996
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"5ee90dcc-26b2"
age
3
x-cache
HIT
content-length
4030
x-served-by
cache-hhn4054-HHN
access-control-allow-origin
*
last-modified
Tue, 16 Jun 2020 18:22:04 GMT
server
GitHub.com
x-github-request-id
B74E:6AF8:DC905E:E39AC9:614B78D8
x-timer
S1632336092.538739,VS0,VE1
date
Wed, 22 Sep 2021 18:41:31 GMT
vary
Accept-Encoding
content-type
image/svg+xml
via
1.1 varnish
expires
Wed, 22 Sep 2021 18:51:28 GMT
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

1 Console Messages

Source Level URL
Text
security warning
Message:
Error with Permissions-Policy header: Unrecognized feature: 'interest-cohort'.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556952