I wanted to know if there's any alternatives to veil-evasion other than AVoid
Forum Thread: Veil-Evasion Alternative
- Hot
- Active
-
Forum Thread: Free Proxy Servers? 9 Replies
5 hrs ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 day ago -
Forum Thread: 12 Ways How to Hack Any Social Network and Protect Yourself 2018 1 Replies
1 day ago -
Metasploit Error: Handler Failed to Bind 40 Replies
4 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
3 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
1 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Make Your Own Bad USB
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Dox Anyone
-
Tutorial: Create Wordlists with Crunch
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Exploit Shellshock on a Web Server Using Metasploit
-
How To: Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit
-
Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)
13 Responses
Creating your own :P
Got any idea how?
Well, no. But I want to know that as well, now.
Ne-Py kinda helped me, check this Post for reference
Hm, quite a good idea.
One way to bypass AV would be to write a program, which does some benign operations like initializing variables and doing calculations for a few seconds, then unencrypts and executes the payload after it's unsandboxed.
That not likely to work as the AV will detect the payload's signature.
That's why you encrypt it first and decrypt when AV leaves you alone. Unless it can be caught after decrypting.
That's not how it works, AV will detect the action and will detect if the program is connecting back to somewhere and will stop it
It's good thought, but good AV is smart. It will detect the payload in a number of ways such as the template used or the decryption tools. You will never get a chance to decrypt it. Those guys aren't dumb.
I think your thinking, but it's not that easy.
The best way to get past AV is to build a new, unique payload.
I did once create a bind shell in python, with AES encryption and colors and stuff.
Do you think it could be detected as malware? How could I include it as a payload in Metasploit?
First, it would have to be written Ruby. I hope to do a tutorial on writing a module for Metasploit in the future.
Awesome.
By the way, what are you working on right now? Just curious.
Check out this program Shellter:
https://www.shellterproject.com/download/
Share Your Thoughts