-
## Description
I was aware that previous versions of OFscraper are flagged by 1-2 engines on [virustotal.com](https://virustotal.com), however when I was updating to 3.12.9, my AV went off as it seem…
-
for red team exercises with windows defender, do you suggest any way to evade the antivirus? I occupied garble but it still detects it as golazagne, therefore it gave me to understand that it can be d…
vay3t updated
2 years ago
-
Has implementing Atom Bombing in Windows payloads and/or making new `windows/atombomb/meterpreter/reverse_xxx` payloads been considered?
***
### Usage References:
http://blog.ensilo.com/atombombi…
-
with what AV/EDR have you used in , to see if do the evasion
kali 2024
~~~~~~~~~~~~~~~~~~
└─$ make all
gcc -Wall -O2 -c main.c -o main.o
main.c:4:10: fatal error: utils.h: No such file or dire…
-
```
C:\Users\dadp0\Desktop\AV Evasion projects\Watson-master\Watson\bin\Debug>Watson.exe
__ __ _
/ / /\ \ \__ _| |_ ___ ___ _ __
\ \/ \/ / _` | __/ __|/ _ \| '_ \
\ /\ / (_| | …
-
Not really an issue/bug, more a feature request. Alot of the Next-Gen AV technologies are catching meterpreter payloads and are becoming very hard to evade because they hook the windows API functions …
-
I'm trying to understand how process injection works, and I might be off here, so please correct me if I’m wrong. Let’s say we want to inject `ethminer` into `svchost.exe`. From what I gather, the pro…
-
Essentially requesting a bunch of RC4 stageless payloads on windows. I believe it will help a lot more with AV evasion if the payloads are stageless and don't request a second stage. I've found some A…
-
I am unable to import gobfuscate `import github.com/unixpickle/gobfuscate is a program, not a importable package.`
I would like to call specific functions within the source code so I can selectivel…
tanc7 updated
2 years ago
-
![image](https://user-images.githubusercontent.com/60698518/126058981-b99d34c9-c586-4058-8137-c59e32af41d1.png)
假设我的密码设置成1
那么我如何利用msf收到反弹shell?