List of Differnet AV evasion Frameworks. List of Differnet AV evasion Frameworks.

Today we are gonna talk about different AV evasion frameworks for metasploit payload & how to use them? It`s very imporatant when you kn...

+ Read more »

ZERO-DAY A Future Threat, And How To Protect Your Data ZERO-DAY A Future Threat, And How To Protect Your Data

ABSTRACT It is known that practically all software has security flaws (programming problems that give individuals opportunities to explore p...

+ Read more »

Backdoor using Netcat, cryptcat , ncat. Backdoor using Netcat, cryptcat , ncat.

Today we are gonna talk about Netcat & its alternative ; i assume that all of you are familiar with Netcat. If not than read here .  Als...

+ Read more »

Get shell Using Shellcode in Macro. Get shell Using Shellcode in Macro.

We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate...

+ Read more »
 
Top