Jump to content

metasploit payload created with SET detection


Recommended Posts


I ve made a payload with SET that isnt detectable by windows defender,

I can perfectly get a meterpreter session without beign detected,

anyway i can do most of the actions that are possible in meterpterer , but when I run the persistence command ,

Windows Defender gives a report of a trojan Swrort.A .

some info

Victim pc is running windows 10 64-bit

I am attacking localy

the attacker is kali sana 2.0

So the question is how can I avoid detection?

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...