I recently started experimenting with Darkcomet rat and some of it's features really appealed to me. Nevertheless I do not succeed in getting the stub or payload created with Darkcomet past the AV of my other computer. Is there anyone who could help me with this problem?
Forum Thread: How to Crypt or Bypass Av with Darkcomet Stub?
- Hot
- Active
-
Forum Thread: How to Find Admin Panel Page of a Website? 14 Replies
6 hrs ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 22 Replies
17 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 207 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
1 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
1 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
2 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
2 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
2 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
2 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
3 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
3 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
4 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
5 mo ago -
Forum Thread: How to Hack School Website 11 Replies
5 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
5 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
6 mo ago -
Forum Thread: Hacking with Ip Only Part [1] { by : Mohamed Ahmed } 5 Replies
7 mo ago -
Forum Thread: Problem with Airmon-Ng and VM 3 Replies
7 mo ago -
Forum Thread: Which one is Animal Picture Is Inside in Kali Linux Wallpaper 3 Replies
10 mo ago
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Dox Anyone
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Brute-Force FTP Credentials & Get Server Access
-
How To: Hack Android Using Kali (Remotely)
-
Hack Like a Pro: How to Get Facebook Credentials Without Hacking Facebook
-
How To: Use Photon Scanner to Scrape Web OSINT Data
-
How To: Hack Any Account That Has Recovery via Phone Option Enabled (SMS) On Android:
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
12 Responses
Do you know how crypting technology works? Do you know how AV software works? If your answer is no to both or either of these questions then of course you you cannot solve this problem. Have you tried experimenting with free options such as Veil Evasion?
I am completely new in crypting but I'd like to start learning it. However I do not know which crypting software I should use to crypt my existing payload. When I tried using Veil-Evasion it provides me with a new payload that can get behind security walls but I do not understand how to do this with an existing payload.
How well do you know C and/or the WINAPI?
I am learning C++ but Veil-Evasion works only for python right and the stub that DarkComet creates isn't.
Here is the source code to Veil Evasion's C WINAPI method. Take your time to look over the code, research the functions and understand the bigger picture. Once you know how everything works, apply your own methods.
GitHub
Thanks alot
let me break it down for you. DarkComet is one of the most well known RATs and therefore 90% of all the AVs you find will know its algorithm and therefore it is useless unless you change the payload, or code your own Crypter (which is for very experienced programmers) my best advice is to find a different rat.
the reason why you need to code your own crypter is because every free crypter you see will be useless, and I guarantee that it will. Because when a software is free, it means anyone in the world can download it, which means white hat hackers and anyone who wants to protect people can download the malware study it and find its algorithm. Even the paid ones are hard to find working because some are willing to pay a hacker for his crypter and they then find the algorithm and again patch it. So again, build your own or go with a different rat.
well after you make it,you can encode it,but you need some skills.and by the way darkcomet must have virus in it,because
2.i don't see any official site of that to download.
Darkcomet is a virus
i know it's a r.a.t but the program that you use to create that virus may have virus too,u can never know for sure
True, I posted this weeks ago so I am now fully convinced about using metasploit instead
Share Your Thoughts