Shellcode Loader/Execute Shellcode - Automate with Python Programming! [Part 2]

preview_player
Показать описание
Be better than yesterday

In this video, we continue where we stopped on the shellcode launcher program, showcasing how we can easily implement additional features into the Python script - such as Base64 encoding and XOR encryption.

As a bonus, we will investigate how our XOR encrypted payload is being detected by Windows Defender and subsequently, bypass Windows Defender and successfully establish a functional reverse shell back onto our Kali machine!

Part 1 of the shellcode launcher video!

Part 1 source code!

DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.

We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.

Free Udemy Course on Introduction to Phishing:

Stay connected:

Looking to donate?
BTC: 19HiqQ2Qw83mxK9dcdoWb8VfAcsNgmp52k

Buy me a coffee!
Рекомендации по теме
Комментарии
Автор

this is the best red team channel on yt, hope for more videos in 2024 !

chizzlemo
Автор

Awesome! Seems that MS has reacted already as my Defender was bitching immediatly after execution, but still - very cool !

WOPR
Автор

Recently found this channel and its a great resource keep up the great content.

namemcnamey
Автор

why not do a Q&A? id love to know how and where u learnt to be so good at Coding and malware development

safe
Автор

still working? because i don't get any reverse connection to my kali machine, i followed all the steps and i tried everything, maybe i'm doing something wrong but once i run on my windows machine "poc.exe example" i don't get any connection back

nkaslq
Автор

You are the BEST un security, amazing

tlykuyiyhaa
Автор

Hello!

Please my question may be out of topic here.
But from your video on ketloggers using chatGPT, I would like to know if that very code can run on an Android device like the Samsung Galaxy Z?

GAMEloft
Автор

Can you please make sure to save everything to a second plattform in case you get taken down?

patrickdee
Автор

Soprry to inform u that this method seams dont work anymore, or at least for me when i download the .exe (with xor enc) its detected immidialty as malware

ilmurlocdiplomato
Автор

can you provide the final .cpp and .py files ?

Mohitkumar-ugjq
Автор

No vedios bro for 1 month how are you are you okay

firosiam
Автор

Hi friend, we are waiting for your spectacular videos. They are usefull and interestings. I hope See You soon!!!

cristianandrade
Автор

Very interesting. But will the reverse connection be cut when the command prompt exits out of the executable? How do you make it persist even when the command prompt closes?

JasonCage-yd
Автор

Nah, bro windows didn’t perform xor decryption, the shellcode is detected after you decrypted and pass it into virtualAlloc and MoveMemory functions

suly
Автор

Hi gemini, love the content, can u please load the code used. Thank u!❤

alumtech
welcome to shbcf.ru