Hey guys I recently started with my journey to become a pentester. However all encoders I found out there all are getting flagged by the Windows Defender as I assume their signature is already well known. I therefore wrote my own encoder which is using OTP to encrypt the payload and then dynamically executes the payload from the stack using a malicious C program. I even managed to run a meterpreter session on a windows machine without the defender flagging the program with this. Feel free to check it out and provide some feedback :)
https://github.com/tomLamprecht/OTPPayloadInjector
Disclaimer: I'm well aware that by publicly uploading this encoder it might get flagged by the windows defender soon as well but who cares, it's all about the fun!
[link] [comments]
from hacking: security in practice https://ift.tt/ItiwrfA
Comments
Post a Comment