Bypassing a FULLY Patched Windows 11 + Defender with a Meterpreter Shell Using ScareCrow!

preview_player
Показать описание
--- In a previous video, I demonstrated how to bypass Windows Defender with Hoaxshell. The downside of Hoaxshell is that it's a simple reverse shell. In this video, we completely bypass Windows Defender on Windows 11 and get a FULL Meterpreter Shell.

I make this as realistic as possible by performing the full attack from a malicious C2 Server I created in Azure with a Public IP address. We then attack my actual physical machine that I use every day. So, once again, I hack myself for your learning!

Enjoy!
--------------

----
Here's my GitHub script to download ScareCrow and all the required dependencies on Kali Linux:
Рекомендации по теме
Комментарии
Автор

I like it man! Keep it up with these kinds of videos, they're really informative.

prtagnist
Автор

Great video Tyler, keep up the great work!

emaadabbasi
Автор

Love it, As a total noob I managed to bypass windows defender on the lab I am doing. I never thought I'd do it this quick. Thanks a bunch

modhafferrahmani
Автор

Great video! Defender has come a long way from back in the day, would like to see more AV bypass with different av products

ErnestoVazquezChoby
Автор

Awesome video thank you Tyler.Keep up the good work.

Stephanus
Автор

Great video! This technique works very well

christopherbruns
Автор

cool love these new type of vedios keep it up i heard about this tool on another chanel months ago it worked then and i thnk it works now aso with some tinkering in payloads when needed

firos
Автор

Outstanding video, thanks for sharing, u got a new sub

tuxmaster
Автор

Nice hope u post more red team evasion techniques and payloads

firosiam
Автор

it feels like fate that I found this video... lol been doing CS for a while and thought payloads were neat. three days later u post haha.

jackalvarez
Автор

Thanks a lot.... Sir, can you please make video on persistent windows backdoor??

rahuliyer
Автор

Hey Man... I've tried many ways to get pass windows defender with payloads even your way didn't work out. is there any other way. Thanx

bandar
Автор

So only if it’s an app you don’t already have, it won’t detect it? Because you already had CMD, but you did not have excel at first

LivingCyberweapon
Автор

Why when I try to open the file .exe in the windows machine it immediatly close? (I try different time)

boomshoot
Автор

"Invalid PKCS7 Data (Empty or Not Padded)" - How i fixed?

policarpo
Автор

Dang so is the mentor part still up and going?

LoneStarBassPursuit
Автор

i am having problem i tried to convert python file to exe the first few times it was fine but the next few times it was considered a threat by windows defender even though i didn't edit the code

cuongnguyenquang
Автор

Didn't work, tried a few different file names they all got picked up right away or wouldn't run at all. Guess im glad AV picked them up though

coopergaffney
Автор

It doesn't work, I did a lot of experiments and the result was the same

yoga
Автор

How to evade heuristic based detection

hiddengo