Tutorials

Creating an undetectable payload using Veil-Evasion Toolkit

In previous tutorials, we used msfvenom for generating various payloads but now a days AV companies coded a signature for the templates these schemes uses so to bypass AV, today we’ll use another framework called as Veil-Evasion Framework. Veil-Evasion is a tool designed to generate metasploit payloads that bypass common Anti-Virus solutions. To install Veil-Evasion, […]

Tech Articles

MSFVENOM – All payload examples – Cheatsheet 2017

Msfvenom is a Metasploit Standalone Payload Generator which is a replacement of msfpayload and msfencode. Through msfvenom, you can generate any kind of shellcode/payload depending upon the platform/OS you want to hack. Often one of the most useful abilities of Metasploit is the msfvenom module. Multiple payloads can be created with this module and it […]

Tech Articles

Meterpreter Useful Top 60 Commands List – 2017 Update

Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. How Meterpreter Works The target executes the initial stager. This is usually one of bind, reverse, findtag, passivex, etc. The stager […]

Online Tools

Top 7 Online Android APK Malware analyzers – FREE

Last week, we discussed about android apk backdooring with msfvenom and metasploit framework. Android is a Linux kernel mobile platform. Android runs on a wide range of devices, from mobile smartphones and tablets, to set-top boxes. The Android mobile operating system is dependent upon the mobile device’s processer capabilities for its performance. Security is a […]

Tutorials

Generate 100% FUD Backdoor with TheFatRat – Windows 10 Exploitation

As you all knows, Windows 10 is the latest edition of Microsoft having great security features but what if someone send a trojan/virus/backdoor/payload which is 100% FUD (Fully Undetectable) ? So basically, with the help of TheFatRat, you can easily develop a Trojan or backdoor and perform various post exploitation methods like Browser Hijacking, DDL […]