I recently started experimenting with Darkcomet rat and some of it's features really appealed to me. Nevertheless I do not succeed in getting the stub or payload created with Darkcomet past the AV of my other computer. Is there anyone who could help me with this problem?
Forum Thread: How to Crypt or Bypass Av with Darkcomet Stub?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Intercept Images from a Security Camera Using Wireshark
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Dox Anyone
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Set Up a Wi-Fi Spy Camera with an ESP32-CAM
-
How To: Hack Android Using Kali (Remotely)
-
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
Hack Like a Pro: Cryptography Basics for the Aspiring Hacker
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
How To: Intercept & Analyze LAN Traffic with a Packet Squirrel & Wireshark
12 Responses
Do you know how crypting technology works? Do you know how AV software works? If your answer is no to both or either of these questions then of course you you cannot solve this problem. Have you tried experimenting with free options such as Veil Evasion?
I am completely new in crypting but I'd like to start learning it. However I do not know which crypting software I should use to crypt my existing payload. When I tried using Veil-Evasion it provides me with a new payload that can get behind security walls but I do not understand how to do this with an existing payload.
How well do you know C and/or the WINAPI?
I am learning C++ but Veil-Evasion works only for python right and the stub that DarkComet creates isn't.
Here is the source code to Veil Evasion's C WINAPI method. Take your time to look over the code, research the functions and understand the bigger picture. Once you know how everything works, apply your own methods.
GitHub
Thanks alot
let me break it down for you. DarkComet is one of the most well known RATs and therefore 90% of all the AVs you find will know its algorithm and therefore it is useless unless you change the payload, or code your own Crypter (which is for very experienced programmers) my best advice is to find a different rat.
the reason why you need to code your own crypter is because every free crypter you see will be useless, and I guarantee that it will. Because when a software is free, it means anyone in the world can download it, which means white hat hackers and anyone who wants to protect people can download the malware study it and find its algorithm. Even the paid ones are hard to find working because some are willing to pay a hacker for his crypter and they then find the algorithm and again patch it. So again, build your own or go with a different rat.
well after you make it,you can encode it,but you need some skills.and by the way darkcomet must have virus in it,because
2.i don't see any official site of that to download.
Darkcomet is a virus
i know it's a r.a.t but the program that you use to create that virus may have virus too,u can never know for sure
True, I posted this weeks ago so I am now fully convinced about using metasploit instead
Share Your Thoughts