NyxInvoke: Rust CLI Tool for Running NET Assemblies with AMSI/ETW Bypass

Listen to this Post

GitHub – BlackSnufkin/NyxInvoke: NyxInvoke is a Rust CLI tool for executing .NET assemblies, PowerShell scripts, and Beacon Object Files (BOFs) with Patchless AMSI and ETW bypass capabilities. It features dual-build support for flexibility in offensive security operations.

You Should Know:

1. Key Features of NyxInvoke

  • Patchless AMSI Bypass: Evades Anti-Malware Scan Interface (AMSI) without direct patching.
  • ETW Bypass: Disables Event Tracing for Windows (ETW) logging to avoid detection.
  • Dual-Build Support: Compatible with different compilation modes for evasion.
  • Rust-Based: Provides memory safety and performance benefits.

2. Practical Usage & Commands

Clone & Build NyxInvoke:

git clone https://github.com/BlackSnufkin/NyxInvoke 
cd NyxInvoke 
cargo build --release 

Execute a .NET Assembly:

./nyxinvoke --dotnet /path/to/assembly.dll --args "arguments" 

Run PowerShell Script with AMSI Bypass:

./nyxinvoke --ps1 /path/to/script.ps1 

Load a BOF (Beacon Object File):

./nyxinvoke --bof /path/to/bof.o --entrypoint main 

3. Defensive Countermeasures (Blue Team)

  • Monitor ETW Disabling Events:
    Get-WinEvent -LogName "Microsoft-Windows-EventTracing/Operational" | Where-Object { $_.Id -eq 2 } 
    
  • Detect AMSI Bypass Attempts:
    Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" | Where-Object { $_.Id -eq 1116 } 
    

What Undercode Say

NyxInvoke is a powerful tool for red teams, leveraging Rust for stealthy execution of offensive payloads. Defenders should focus on ETW and AMSI telemetry to detect such bypass techniques. Always test in controlled environments.

Expected Output:

[+] .NET assembly executed: /path/to/assembly.dll 
[+] AMSI bypass successful. 
[+] ETW logging disabled. 

Relevant URLs:

References:

Reported By: Florian Hansemann – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image