I recently started experimenting with Darkcomet rat and some of it's features really appealed to me. Nevertheless I do not succeed in getting the stub or payload created with Darkcomet past the AV of my other computer. Is there anyone who could help me with this problem?
Forum Thread: How to Crypt or Bypass Av with Darkcomet Stub?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Hack Facebook & Gmail Accounts Owned by MacOS Targets
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Track Wi-Fi Devices & Connect to Them Using Probequest
-
How To: The White Hat's Guide to Choosing a Virtual Private Server
-
How To: Gather Information on PostgreSQL Databases with Metasploit
-
How To: Make Your Own Bad USB
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Fuzz Parameters, Directories & More with Ffuf
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
-
How To: Scrape Target Email Addresses with TheHarvester
-
How To: Dox Anyone
-
Hack Like a Pro: Cryptography Basics for the Aspiring Hacker
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities
12 Responses
Do you know how crypting technology works? Do you know how AV software works? If your answer is no to both or either of these questions then of course you you cannot solve this problem. Have you tried experimenting with free options such as Veil Evasion?
I am completely new in crypting but I'd like to start learning it. However I do not know which crypting software I should use to crypt my existing payload. When I tried using Veil-Evasion it provides me with a new payload that can get behind security walls but I do not understand how to do this with an existing payload.
How well do you know C and/or the WINAPI?
I am learning C++ but Veil-Evasion works only for python right and the stub that DarkComet creates isn't.
Here is the source code to Veil Evasion's C WINAPI method. Take your time to look over the code, research the functions and understand the bigger picture. Once you know how everything works, apply your own methods.
GitHub
Thanks alot
let me break it down for you. DarkComet is one of the most well known RATs and therefore 90% of all the AVs you find will know its algorithm and therefore it is useless unless you change the payload, or code your own Crypter (which is for very experienced programmers) my best advice is to find a different rat.
the reason why you need to code your own crypter is because every free crypter you see will be useless, and I guarantee that it will. Because when a software is free, it means anyone in the world can download it, which means white hat hackers and anyone who wants to protect people can download the malware study it and find its algorithm. Even the paid ones are hard to find working because some are willing to pay a hacker for his crypter and they then find the algorithm and again patch it. So again, build your own or go with a different rat.
well after you make it,you can encode it,but you need some skills.and by the way darkcomet must have virus in it,because
2.i don't see any official site of that to download.
Darkcomet is a virus
i know it's a r.a.t but the program that you use to create that virus may have virus too,u can never know for sure
True, I posted this weeks ago so I am now fully convinced about using metasploit instead
Share Your Thoughts