RedOps X
RedOps X
  • 11
  • 5 352
Norton 360 Bypass using Metasploit C2 (Meterpreter) - Dumping SAM/SYSTEM and LSASS.exe memory
Bypassing Norton 360 on the latest version of Windows 10, while injecting beacon into the other processes and establishing a reverse shell with a Metasploit C2 server (Meterpreter). Dumping the lsass.exe memory and SAM/SYSTEM registries as well.
Covering articles about cybersecurity news and more!
-----------------------------------------------
Windows Defender bypass
Reverse shell creation
C++ reverse shell
GitHub reverse shell
Malware development 101
Undetectable reverse shell
Windows internals
Windows API functions
Socket library usage
Windows Defender detection evasion
Obfuscation techniques
Obfuscation methods
Understanding obfuscation
Windows security bypass
Anti-virus evasion techniques
Malware evasion tactics
Hacking Windows defenses
Reverse engineering Windows
Cybersecurity bypass techniques
Exploiting Windows vulnerabilities
Bypassing antivirus software
Avoiding detection by Windows Defender
2024
2025
BYPASS
BYPASS AV
Windows Defender
Windows 11
Crypter
Encryption
Hacking
Quasar
Bug Bounty
Xworm
NjRAT
RemcosRAT
AsyncRAT
VenomRAT
Undetectable
0day
Fud
RunTime
Trojan
Subscribe, like, and comment!
#antivirus #hacking #HackerSploit #meterpreter #metasploitframework #metasploit #s4vitar #savitar #wannacry #program #malwarebytes #virustotal #hak5 #hacker #evasion #bugbounty #bugbountytips #bypassing_edr #edr_av #informationsecurity #infosec #informationtechnology #ramsomware #ctf #cybersecurity #hacker #tryhackme #Twitch #metasploitable #Cogota #redteam #pentesting #hacking #wordpress #kalilinux #Zunderrub #exploit #vulnerability #cms #sudo #suid #chmod #socat#sql #sqlmap #sqlinjection #ftpserver #brainfuck #python #hijacking #activedirectory #AD #windows #ldap #smb #kerberos #malware #infosec #havocc2 #havoc #edr #watchguard #bitdefender #crowdstrike #eset #sophos #trendmicro #techinalguruji #technicalguruji #mrbeast #techchip #hindi #indiagotlatent #samayraina #punjabi #india #indianarmy #vlog #ajayvlog #CID #सीआईडी #CrimeThrillers #CrimeMysteries #Mysteries #Horror #NewCID #Crime #NewCID #LatestCID #setindia ##NewSeason #CIDReturns #DayaReturns #techburner #AbhijeetReturns #CID2025 #CIDisBack #PurviReturns #carryminati #technogamerz #technology #whonix #macOS #applesilicon #usbrubberducky #mrrobot #wifiduck #antivirus #virus #windows #antivirus #virus
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
มุมมอง: 109

วีดีโอ

McAfee Total Protection Bypass using Havoc C2 - Process Injection
มุมมอง 35619 ชั่วโมงที่ผ่านมา
Bypassing McAfee Total Protection on the latest version of Windows 10, while performing process injection into other processes and establishing a reverse shell with a Havoc C2 server. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows internals Windows...
Malwarebytes Premium Bypass using Metasploit C2 (Meterpreter)
มุมมอง 394วันที่ผ่านมา
Bypassing Malwarebytes Premium Antivirus on the latest version of Windows 10, while performing process injection into other processes and establishing a reverse shell with a Metasploit C2 server. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows inter...
Quick Heal Total Protection Bypass using Havoc C2 - Process Injection
มุมมอง 110วันที่ผ่านมา
Bypassing Quick Heal Total Protection on the latest version of Windows 10, while performing process injection into other processes and establishing a reverse shell with a Havoc C2 server. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows internals Win...
Kaspersky Plus Protection Bypass using Havoc C2
มุมมอง 373วันที่ผ่านมา
Bypassing Kaspersky Plus Protection on the latest version of Windows 10, while injecting beacon into the current process and establishing a reverse shell with a Havoc C2 server. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation Kaspersky bypass Crowdstrike bypass Meterpreter Metasploit C reverse shell GitHub reverse shell Malware development 101...
Trend Micro Maximum Security Bypass using Metasploit (Meterpreter) - (Process Injection)
มุมมอง 173วันที่ผ่านมา
Here’s another video where I bypassed Trend Micro Maximum Security on the latest version of Windows 10 by performing process injection into other processes using Metasploit meterpreter. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows internals Windo...
CrowdStrike Falcon Sensor Bypass using Metasploit C2 (Meterpreter)
มุมมอง 3K14 วันที่ผ่านมา
Bypassing Crowd Strike Falcon on the latest version of Windows 10, while injecting beacon into the current process and establishing a reverse shell with a Metasploit C2 server. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows internals Windows API fu...
WatchGuard Advanced EPDR (Dumping LSASS.exe) - Havoc C2
มุมมอง 10314 วันที่ผ่านมา
Bypassing WatchGuard Advanced EPDR on Windows 10 involves injecting a beacon into the current process, unhooking memory hooks, establishing a reverse shell with a Havoc C2 server, and dumping the LSASS memory to extract credentials. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Und...
ESET Smart Security Premium Antivirus (Dumping SAM/SYSTEM/Security) using Havoc C2
มุมมอง 9514 วันที่ผ่านมา
Bypassing ESET Smart Security Premium Antivirus on the latest version of Windows 10. This process includes injecting a beacon into the current process by removing hooks from userland to avoid detection while simultaneously establishing a reverse shell connection with a Havoc C2 server. Once the reverse shell is active, further exploitation can proceed, such as extracting critical system files, ...
Sophos Home Premium Antivirus (Process Injection) - Metasploit (Meterpreter)
มุมมอง 10614 วันที่ผ่านมา
Bypassing Sophos Home Premium Antivirus on the latest version of Windows 10 using Metasploit, while performing process injection into other processes. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse shell Windows internals Windows API functions Socket library usa...
CrowdStrike Falcon Sensor Bypass using Havoc C2 - Dumping SAM/SYSTEM
มุมมอง 58914 วันที่ผ่านมา
Bypassing Crowd Strike Falcon on the latest version of Windows 10, while injecting beacon into the current process and establishing a reverse shell with a Havoc C2 server. Dumping the SAM/SECURITY/SYSTEM registries. Covering articles about cybersecurity news and more! Windows Defender bypass Reverse shell creation C reverse shell GitHub reverse shell Malware development 101 Undetectable reverse...

ความคิดเห็น

  • @wutangdaug
    @wutangdaug 2 วันที่ผ่านมา

    Did you have to modify the metasploit framework to avoid the memory signature? Or was it all about the loader?

  • @killimolli
    @killimolli 3 วันที่ผ่านมา

    Lol, yet another scriptkiddie does his "magic". :D

  • @mnabeelmansoor
    @mnabeelmansoor 4 วันที่ผ่านมา

    Hi, could you do the same with Dr. Web Security Space?

  • @BigG9982
    @BigG9982 5 วันที่ผ่านมา

    what encryption you use for encrypt shellcode ?

    • @cucumber282
      @cucumber282 3 วันที่ผ่านมา

      its fake

  • @mrrobot1o1
    @mrrobot1o1 5 วันที่ผ่านมา

    Hello, bro. What technique are you using, and how did you manage to do that? Any hints in this regard would be really helpful.

  • @STEAK762
    @STEAK762 7 วันที่ผ่านมา

    Interesting stuff

  • @martindespagna
    @martindespagna 7 วันที่ผ่านมา

    hi

  • @Besamurai
    @Besamurai 7 วันที่ผ่านมา

    where do you even learn stuff like this? ive been trying to get started with tryhackme but its been slow so far

  • @_megunes
    @_megunes 8 วันที่ผ่านมา

    Kaspersky does not check manually run scripts. Try executing directly.

    • @OlevOS
      @OlevOS 7 วันที่ผ่านมา

      real

  • @MedBechir-bd6em
    @MedBechir-bd6em 9 วันที่ผ่านมา

    I want to try this. You can give me the script used to get the reverse shell??

  • @jasonk6234
    @jasonk6234 10 วันที่ผ่านมา

    Is this just bypassing old versions of CrowdStrike… I suppose it’s good to practice this but good luck finding this anywhere

  • @AlexFree8698
    @AlexFree8698 11 วันที่ผ่านมา

    I like much the hacking!

  • @roykoren5171
    @roykoren5171 11 วันที่ผ่านมา

    how?

  • @xInferenalx
    @xInferenalx 12 วันที่ผ่านมา

    can you give us the script of passDef.ps1?

  • @User9681e
    @User9681e 13 วันที่ผ่านมา

    I would like comodo on proactive settings and cyberlock (voodoo shield ) tested

  • @Slm3lkm
    @Slm3lkm 15 วันที่ผ่านมา

    can you do BitDefender ??

    • @RedOpsX
      @RedOpsX 15 วันที่ผ่านมา

      Yes, absolutely! The video on bypassing BitDefender is on the way 🚀

  • @Quilqe
    @Quilqe 15 วันที่ผ่านมา

    These are the people securing big offices around the world 😭 We are cooked

    • @RedOpsX
      @RedOpsX 15 วันที่ผ่านมา

      If we follow good practices and implement security properly, there's no need to worry. The key is education, prevention, and having robust systems that stay one step ahead of attackers. 💪🔒

  • @ExaltedOWL
    @ExaltedOWL 15 วันที่ผ่านมา

    i see, random question is the sleep function required to avoid the detection. thanks

    • @RedOpsX
      @RedOpsX 15 วันที่ผ่านมา

      The sleep function isn't strictly required to avoid detection, but it can help. Sleep functions or delays are often used to mimic normal application behavior and evade detection by slowing down execution, making it harder for security solutions to identify malicious patterns. However, its necessity depends on the specific technique and environment you're working with. Hope this can help you!

    • @ExaltedOWL
      @ExaltedOWL 14 วันที่ผ่านมา

      @@RedOpsX got it, many thanks