Hey man! Thanks for giving it a try. I am sure you can get it working again by adding more conditions to it, or doing a XOR + Base64 on your payload. Cheers!
still working? because i don't get any reverse connection to my kali machine, i followed all the steps and i tried everything, maybe i'm doing something wrong but once i run on my windows machine "poc.exe example" i don't get any connection back
Hello! Please my question may be out of topic here. But from your video on ketloggers using chatGPT, I would like to know if that very code can run on an Android device like the Samsung Galaxy Z?
Soprry to inform u that this method seams dont work anymore, or at least for me when i download the .exe (with xor enc) its detected immidialty as malware
Very interesting. But will the reverse connection be cut when the command prompt exits out of the executable? How do you make it persist even when the command prompt closes?
you need to make another file that will install the main exe and then run it along with an argument (for persistence you can just make the dropper copy itself to startup)
@@SolitaryElite oh ok. I saw a method where the executable only has to run once, then it will create a reverse connection to our machine. After running the executable, the command prompt can be closed.
this is the best red team channel on yt, hope for more videos in 2024 !
Awesome! Seems that MS has reacted already as my Defender was bitching immediatly after execution, but still - very cool !
Hey man! Thanks for giving it a try.
I am sure you can get it working again by adding more conditions to it, or doing a XOR + Base64 on your payload.
Cheers!
where are you bro?
why not do a Q&A? id love to know how and where u learnt to be so good at Coding and malware development
Recently found this channel and its a great resource keep up the great content.
You are the BEST un security, amazing
Hi friend, we are waiting for your spectacular videos. They are usefull and interestings. I hope See You soon!!!
still working? because i don't get any reverse connection to my kali machine, i followed all the steps and i tried everything, maybe i'm doing something wrong but once i run on my windows machine "poc.exe example" i don't get any connection back
Hello!
Please my question may be out of topic here.
But from your video on ketloggers using chatGPT, I would like to know if that very code can run on an Android device like the Samsung Galaxy Z?
This is really nice. Amazing work!
Awesome stuff man!
Soprry to inform u that this method seams dont work anymore, or at least for me when i download the .exe (with xor enc) its detected immidialty as malware
Can you please make sure to save everything to a second plattform in case you get taken down?
can you provide the final .cpp and .py files ?
Very interesting. But will the reverse connection be cut when the command prompt exits out of the executable? How do you make it persist even when the command prompt closes?
you need to make another file that will install the main exe and then run it along with an argument (for persistence you can just make the dropper copy itself to startup)
@@SolitaryElite oh ok. I saw a method where the executable only has to run once, then it will create a reverse connection to our machine. After running the executable, the command prompt can be closed.
waiting for next video
No vedios bro for 1 month how are you are you okay
Is this detectable in kaspersky free?
Nah, bro windows didn’t perform xor decryption, the shellcode is detected after you decrypted and pass it into virtualAlloc and MoveMemory functions
where r u bro?
Hello,
I am still here and I am doing fine! I hope that you're doing fine as well!
@@gemini_security when is u r next video?
@@gemini_security when is u r next video?
Keep up the good work (y)
Thank you so much sir
Hi gemini, love the content, can u please load the code used. Thank u!❤
Sure, uploaded - github.com/gemini-security/shellcode101
yes and no i suppose.
????
❤❤
hlo bro
hlo
Promo*SM 🌺