Why should I write my own payloads or malware, instead of just using a payload with a Meterpreter, generated by Veil-Evasion or something?
Forum Thread: Why Use Custom Malware?
- Hot
- Active
-
Forum Thread: What Are Some Good Budget Laptops for Pentestin 12 Replies
2 days ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 8 Replies
2 days ago -
Forum Thread: Hack Instagram Account Using BruteForce 193 Replies
2 days ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 117 Replies
4 days ago -
Forum Thread: How Do I Access Different Directories Within Android via Meterpreter 5 Replies
6 days ago -
Forum Thread: Best Programming Language? 8 Replies
1 wk ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 4 Replies
1 wk ago -
Forum Thread: Fix Meterpreter Problem 2 Replies
1 wk ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 31 Replies
2 wks ago -
Forum Thread: Need Help with FatRat Over WAN 1 Replies
2 wks ago -
Forum Thread: Kali Linux Boot Error 8 Replies
2 wks ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 8 Replies
2 wks ago -
Forum Thread: Kali linux command error. Kindly help 3 Replies
2 wks ago -
Forum Thread: How to Create a Python Remote Keylogger for Facebook 27 Replies
2 wks ago -
Forum Thread: Kali Linux Handshake Porblem 2 Replies
2 wks ago -
Forum Thread: Port Forwarding Problem in Metasploit Can't Establish Connection (WAN) 3 Replies
3 wks ago -
Forum Thread: GMail Brute Force Dictionary Attack Script 31 Replies
4 wks ago -
Forum Thread: Msfvenom Android Exploitation Outside LAN? 12 Replies
4 wks ago -
Forum Thread: How to decrypt .CAP file of handshake during WiFi attack 2 Replies
4 wks ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 7 Replies
1 mo ago
-
How To: Clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Hack Android Using Kali (Remotely)
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
How To: Master Python, Django, Git & GitHub with This Bundle
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Hack Wi-Fi Networks with Bettercap
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator
-
The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
2 Responses
You dont have to write your payloads, if you know how they works and if you understand them you will probably know how to write them.
Writing them yourself gives you the advantage of being able to craft a SPECIFIC piece of malware with SPECIFIC properties for SPECIFIC situations. Very useful if you need to whip up something quick ;)
Share Your Thoughts