catch EVERY reverse shell while hacking! (VILLAIN)

preview_player
Показать описание


Help the channel grow with a Like, Comment, & Subscribe!
Check out the affiliates below for more free or discounted learning!

📧Contact me! (I may be very slow to respond or completely unable to)

00:00 Villain
02:21 About Villain
04:17 Setup
04:50 Shellcrafting
07:42 Sending the payload
09:09 Multiplayer hacking
11:55 HQ Ownership
15:59 A few more features
16:53 Final thoughts
18:05 Closing out
Рекомендации по теме
Комментарии
Автор

DID YOU KNOW that (obviously intentionally) placing a TYPO within the first THREE seconds of your video helps increase audience engagement and boosts your videos in the

_JohnHammond
Автор

The inspiration and "try harder" attitude to create Villain came from the video you made about hoaxshell. For that reason, as well as your remarkable effort to educate people in IT/Cybersec for a decade now, I dedicate Villain to you. Thank you🙏<3

HaxorTechTones
Автор

Thank you T3l3Machus and John for the amazing tool and usual 10 out of 10 quality education !

Zerback
Автор

I love his tools but I love even more your explanations and tutorials. You guys complement each other.

Boolap
Автор

the small differences in this video like the sound track used and the "waves shennanigans on John's head" at the bottom right corner is kinda slick though 👌

konfushon
Автор

You deserve every penny for this ad! best explain and show and currently on my cpts path!

marne
Автор

Regards from Dominican Republic 🇩🇴. I think your channel is pretty cool and I've learned a lot since I found this Channel, I was stuck with the Reverse Shell thing, but thanks to you I got out of that corner, brother. THANK YOU!.

free_venezuela
Автор

Your content is improving like a super sayian after each video.

karkantas
Автор

Definitely love the multiplayer aspect, much like cobalt strike's team server concept. Very useful for actual red team engagements where there's multiple operators.

StrokeMahEgo
Автор

A dude said in a previous vid of your "John doesn't need fancy thumbnails, has face does it all" and yeah it really does, man!
Keep putting nice content 🙂, coool tool. That OTP thing is the coolest one.
You haven't done any writeups lately though ;)
+ Video is nice enough, editing, music.
If possible plz share pc specs the one which is running 1 host + 4 vms without any lag.

hawk__
Автор

Thank you very much for showcasing that.
Tbh I have actually really been looking for a framework like that to when ever I play ctf's ( specially if I ever are going to attend where its teams agenst teams ) so its great to have it in my tools folder

tanjadk
Автор

John from another John...you are a legend. Coming from and education and training background to cyber warfare now a security researcher. You encompass everything good in our industry. Keep it up! See you around!

johnb
Автор

i been using this for a week so far .. i have tested it on many OS versions, windows 7 - 10 -11 / linux, always bypass any fiirewall/defender never let me down, the good thing that i can get multiple reverse shell just in one click, without having to setup a new listener for each reverse shell payload ... thats really amazing tool

samfisher
Автор

Windows defender already blocked those payload after few days later.

hongkonghacker
Автор

Realizing your video is sponsored by HTB Academy is pretty cool! CPTS is probably my next thing to work on if I pass OSCP on December 12th :D

JeffNoel
Автор

Loved the video quality, especially your cam circle effects when you speak!

faran
Автор

Great tutorial John H. Thanks for your effort to help less advanced hackers or IT lovers understand some of the tricks .

janekmachnicki
Автор

Damn John the production quality is on point!

struggle
Автор

The most amazing thing to me is thar the whole script was written with python.... amazing 👏🙀 great to see this ... I subscribed

adesopekingsley
Автор

Just saw a talk about hoaxshell on which a penetrationtester was hyping it up so much only to not work anymore after two days because everyone burned the signature haha.
So interesting to see the new shell framework. Lets see for how long its working on engagements :D

Rojawa