I changed my tag a few days ago but prior to that, you have asked me a question about my handle after I commented on your receiving certification... I sent a reply back but had a feeling I wouldn't be able to receive your response if you sent one... I also have my ability to network totally blocked because of all of this. I love your videos and as soon as my youngest daughter starts school, I plan on going to school for cyber security so I can help anyone who would ever have to experience something as I have! I've vowed to make it my mission to never allow any other being feel as I have during an attack such as I am experiencing...
You can use it for testing, but it won't work like that nowadays. Every AV & Endpoint Protection knows these standard payloads without encoder or encryption.
I have one noob question. #1 Does kali and windows both need to be in the same vbox like VirtualBox? What network connection must it be to connect each other? NAT? Host? #2 If I have Kali on VirtualBox, ubuntu on vmware can they comnected if i wanna test reverse shell? What the network configuration i must do to connect each of em. Bridged? #3 other recommendations?
Let me break it down for you: There's 3 Network Type: Host, Bridge, NAT Host - private network. You must set the IP address and Subnet Mask in the VM OS. Devices within the same IP range (determined by subnet mask) can communicate with each other. Bridge - Bridge mode allows your VM to act as its own device on your network, with its own IP address. This means that the VM will be assigned a Dynamic IP address from your Wi-Fi router itself. This is useful if you're running services or applications that require direct network access, or if you want to mimic a real network environment but poses a security risk. NAT - NAT mode offers security and ease of setup, isolating the VM from external networks. You will get Network access like Bridge, but the IP will not be assigned by the Wi-Fi router
I guess from a noob's perfective, the trick would be to make the file name seem so genuine so the user thinks Defender is being defender and clicks that run anyway button. Like a movie file that's actually a Trojan and give you reverse shell.
@-ksj- Zero days are hard to get unless you are willing to pay big bucks in those shady forums or develop your own zero-day(not worth it just to hack low-profile figure). You just need the target machine to have 1 vulnerable software and you can run a buffer overflow attack which run the shellcode. But the Defender will still notify depending on shellcode used. You can try reading up on DLL injection/API hooking techniques. If you want the safest, you can read up on Python modules. 1) Create 1 malicious python module 2) Import it into the main python code which when executed, it will run the malicious module. I tested it out on Windows 11 and the defender isnt triggered
can you show us please how to do reverse shell when we are connected with some remote application like TeamViewer or Anydisk ? How to Access the Host System in this case ? please make a video on it But use different Subnets Not in Virtual Machine !
thats insane. it worked for me. but i didnt understand why? why when we copied the ps1 file my target machine could access it with ip address and file path?
describe about windows defender detection in every videos these payloads don't evade anti virus or windows defender they are easily caught and removed.
Congrats. However my reverse.exe file doesn't run in my window machine , it pops a message that it can run on the given software version. What do i need to do???
Windows 10 and further detect a powershell like this instant as a virus and deleting it instantly. So no proof on that easy concept. Also Gmail and Gchrome detecting it. Upload on G drive is possible but the download on shared links is blocked by google because it is out of the using terms. So here is the standard WIndows firewall a Problem for targeting machines. Will testing it on some linux systems next. But at all thx for your videos and keep it going so well.
Loi I appreciate your effort , but may you please make more tutorials bout Metasploit android working payloads . i try many payloads but most of them never works.Thank you !😇
Hello can you help me with arp poisoning but i start it on my router and i don't know how to disable it this is work all time at i have launched ettercap but too i deleted a hosts and this is still working and i pressing a stop mitm attack and this is not stopped ☹
System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down when i try running systemctl anyone have a fix for this???
There's this file on my computer i'm trying to access called PelagornisSandersi that is locked. i want to delete it. any advice is greatly appreciated.
no one will teach you. you have to learn yourself. you need lots of learning its not easy it's very hard but at the end you will be pleased. i dont like what I saw in this video I suggest you learn programming first. especially Assembly/c/c++ if you want to be a real h@ck3r. you can play with python to learn the concept but dont spend so much time with it unless its necessery. last thing i will say. dont give up
The fact that there botnets with millions of zombies showcases allot of sane people blindly trust some of these tools 😢, it only takes a few lines of code to gras juicy details, we need less script kiddies and more people need to have the ability to asses the tools code there about to execute
your videos are always great, even though am very noob. please sir can you help me get my gmail back, i trusted someone with it and the person took over it
If Metaspyclub has the growth as it has atm then no doubts it will dominate the industry
Metaspyclub trajectory is fascinating. Share your insights!
Such a cooperative client user.
how did this guy even get this clout like all he teaches is useless info
he is funny :)))))))))))))@@shibinus
😂
@@shibinus He makes these videos like this so he doesn't get in trouble with TH-cam.
I changed my tag a few days ago but prior to that, you have asked me a question about my handle after I commented on your receiving certification... I sent a reply back but had a feeling I wouldn't be able to receive your response if you sent one... I also have my ability to network totally blocked because of all of this. I love your videos and as soon as my youngest daughter starts school, I plan on going to school for cyber security so I can help anyone who would ever have to experience something as I have! I've vowed to make it my mission to never allow any other being feel as I have during an attack such as I am experiencing...
this is your 420th [public] video, congrats handsomeLoi!
You can use it for testing, but it won't work like that nowadays.
Every AV & Endpoint Protection knows these standard payloads without encoder or encryption.
Such a great channel, you rock man! Please do a video on a rat for android environments. Keep up the great content!
He has a course on this that you can buy. See his description links.
What is the point of using the reverse shell website if you have these programs on a Kali machine already?
for pumping out content
what is the programs name?
I remember having people looking over my shoulder so id type the tree command. Very impressive to spectators lol
You could also do the "dir" command and get a list of directories that lasts about 30 seconds. Much cooler if you ask me.
@@DPME820well he’s probably on a Linux OS in which the dir command doesn’t work so
@@mogeebape9532 That's true.....and I suppose the linux version of dir, 'ls' doesn't seem as cool
4:37 😮😮😮
How dare you !!!
You could have just ran this
( sudo !! )
yeah😂😂
yeah😂😂
Can you make a video on how to do SQLi with union, maybe talk about db schemas, i struggle with that part 🙏
I have one noob question.
#1 Does kali and windows both need to be in the same vbox like VirtualBox? What network connection must it be to connect each other? NAT? Host?
#2 If I have Kali on VirtualBox, ubuntu on vmware can they comnected if i wanna test reverse shell? What the network configuration i must do to connect each of em. Bridged?
#3 other recommendations?
Netcat let's you connect over network
Let me break it down for you:
There's 3 Network Type: Host, Bridge, NAT
Host - private network. You must set the IP address and Subnet Mask in the VM OS. Devices within the same IP range (determined by subnet mask) can communicate with each other.
Bridge - Bridge mode allows your VM to act as its own device on your network, with its own IP address. This means that the VM will be assigned a Dynamic IP address from your Wi-Fi router itself. This is useful if you're running services or applications that require direct network access, or if you want to mimic a real network environment but poses a security risk.
NAT - NAT mode offers security and ease of setup, isolating the VM from external networks. You will get Network access like Bridge, but the IP will not be assigned by the Wi-Fi router
Sir, you are the most handsome man on the Earth!!!😁😁😁 And you are the coolest too.😁😁😁
make a video for IIS web server shell and access database
Very good i did it myself but what about the powershell command line its still open
Hey I need a bit of help in something is there any way I can send you messeges? It isn't anything with the video.
This shell generator was created by the best ethical hacker in the world
How to bypass windows defender?..
Zero day 😂
I guess from a noob's perfective, the trick would be to make the file name seem so genuine so the user thinks Defender is being defender and clicks that run anyway button. Like a movie file that's actually a Trojan and give you reverse shell.
@-ksj- Zero days are hard to get unless you are willing to pay big bucks in those shady forums or develop your own zero-day(not worth it just to hack low-profile figure). You just need the target machine to have 1 vulnerable software and you can run a buffer overflow attack which run the shellcode. But the Defender will still notify depending on shellcode used. You can try reading up on DLL injection/API hooking techniques. If you want the safest, you can read up on Python modules.
1) Create 1 malicious python module
2) Import it into the main python code which when executed, it will run the malicious module. I tested it out on Windows 11 and the defender isnt triggered
How do you access ur local host server in another machine. What kind of network adapter do you use?
set the router to forward it to your kali linux ip and port
can you show us please how to do reverse shell when we are connected with some remote application like TeamViewer or Anydisk ? How to Access the Host System in this case ? please make a video on it But use different Subnets Not in Virtual Machine !
whats the point of reverse shell generators of they dont work?
Can you make a video on keylogger But in another way
When I type the Kali Linux IP and then the file windows edge gives me an error that it can't reach the page
How in youtube they reverse scammer and enter on scammer pc can you please make video on it. How they enter on scammer computer
How to do hacking with using Python programming please
thats insane. it worked for me. but i didnt understand why?
why when we copied the ps1 file my target machine could access it with ip address and file path?
nice video but the antivirus will block it
where did you get the sql payloads from ??
what port number we have ti give and how to know the port number
describe about windows defender detection in every videos these payloads don't evade anti virus or windows defender they are easily caught and removed.
Hi. How to decide the port number ?
I Love You My Favorite Teacher 🤩😍
Fantastic, Amazing and Awesome 😄🤩😍😍
@ Loi Liang Yang How could we search for a vehicle with make and model in a specific area?
Making a word of script kiddies, one view at a time!
Android control power reverse shell video please
Congrats. However my reverse.exe file doesn't run in my window machine , it pops a message that it can run on the given software version. What do i need to do???
hey bro, i have problem installing veil in my kali linux, any guide here?
Por favor, adicione faixa de áudio nos seus vídeos. Vai ajudar muito a gente entender melhor.
Make a video like nft minting bot, and auto swiper bot making.
Thanks a lot Sir! Hope very I will be taking my ethical hacker courses on Udemy wish to start u as my first teacher 🎧💻👊🚴😔🔥🙏👏
I just noticed that if you watch this video with 2x speed, it feels like you’re watching another video with 6x speed! 😂
when i paste the link in my browser it says request timed out, what do i do
Bro your powershell payload Detected on my window 10 Antivirus.
Use veil evasion to hide the package from avs (not all, but some)
Theme Dark so you look like a hacker 😎 😂
Do you have classes for udemy training
Windows 10 and further detect a powershell like this instant as a virus and deleting it instantly. So no proof on that easy concept. Also Gmail and Gchrome detecting it. Upload on G drive is possible but the download on shared links is blocked by google because it is out of the using terms. So here is the standard WIndows firewall a Problem for targeting machines. Will testing it on some linux systems next.
But at all thx for your videos and keep it going so well.
Loi I appreciate your effort , but may you please make more tutorials bout Metasploit android working payloads . i try many payloads but most of them never works.Thank you !😇
Amazing vídeo!
First!…can you make a telegram channel for resources and where we can ask questions!
The question is, how "hackers" do that? How they plan that you download that .exe? With redirections or same?
are ur antivirus disabled?
Really amazing video
first of all. change the theme dark. that will make you look like a hacker.........😂😂😂 that killed me
Hello can you help me with arp poisoning but i start it on my router and i don't know how to disable it this is work all time at i have launched ettercap but too i deleted a hosts and this is still working and i pressing a stop mitm attack and this is not stopped ☹
use another tool like arpsoof. i find that to be easier to use
We need bypass Av
System has not been booted with systemd as init system (PID 1). Can't operate.
Failed to connect to bus: Host is down when i try running systemctl anyone have a fix for this???
There's this file on my computer i'm trying to access called PelagornisSandersi that is locked. i want to delete it. any advice is greatly appreciated.
Hey hacker loi post a tutorial of how to hack a camera 💚💚💚
Yeah...
Pls do 🙏
The windows defender is blocking it
Whoami, not who are you lol. Since the revshell is already active the whoami will give the remote system info.
his eye's always look like someone who hasn't sleep for days
how to do in windows
hello sir, one of your video's you talk about how you can help someone get back his hacked gmail. can you help me sir
dont mess wit this guyy GGS its over
Thanks
Windows defender can catch all these stuff ... Please learn us the professional way to hack
use a bad usb or raspberry pico to disable anti virus
no one will teach you. you have to learn yourself. you need lots of learning its not easy it's very hard but at the end you will be pleased.
i dont like what I saw in this video
I suggest you learn programming first. especially Assembly/c/c++ if you want to be a real h@ck3r. you can play with python to learn the concept but dont spend so much time with it unless its necessery.
last thing i will say. dont give up
More remote control videos
i will do one pushup for every like i get 😅
Nice way to get more likes !
What about unlikes?
@@J1MRAYN0R one less XD
Do a negative for each dislike
Proof of push-ups please 😋
is'nt their any 0 clicking method or way to do that////
that one need exploits already
Can I hack wifi without wifi adaptor
❤❤❤ nice video
Is there anyone senior in hacking who can clear my doubts?
Hello Yiang how are
eyyyyy NICE VIDEO
can u atleast heart this comment i pwease
Please so for Android
Why are here so many bots?
Thanks so much I have hacked my first laptop I tried to hack my big brother as well but he told me not to do so 😂😢
fight for the exploiting the hacking terminal in whatsapp application..
Not me anywhere in this video
what port should i use
Always here >-
Love you all taim
i just like to watch you for liren
Good
No sane person is gonna download something and run it through 😅
The fact that there botnets with millions of zombies showcases allot of sane people blindly trust some of these tools 😢, it only takes a few lines of code to gras juicy details, we need less script kiddies and more people need to have the ability to asses the tools code there about to execute
goox job
Windows Defender 😂
First to watch, first to like lol 😂
Top 🎩😊
Awsomr ❤❤❤
If you are a true hacker tell us how to hack android mobile by sending a simple link
Ethical hacker?
❤❤❤❤❤❤❤❤❤
👍🏻
How can we prove that🤣🤣🤣🤣
Can I have free pineapple wifi pleaseee😢
❤
your videos are always great, even though am very noob. please sir can you help me get my gmail back, i trusted someone with it and the person took over it
😔😔😔😔😔😔😔😔😔😔😔😔😔😔