• XSS.stack #1 – первый литературный журнал от юзеров форума

Reliable cryptor

Пожалуйста, обратите внимание, что пользователь заблокирован
if
That a quality post, I've read about:

The information examined during the static analysis is as follows.
P.E. (Portable Executable) Headers
Imported DLL's
Exported DLL's
Strings in binary
CPU Instructions

While doing dynamic analysis, you should carefully examine the following events. (dynamic analyse)

Network Connections
File Events
Process Events
Registry Events

Making your malware FUD is all a science of obfuscation and ways to bypass AV, if you use someone else malware and have no experience in FUD crypter it will be hard to obfuscate it because malware signature will make it detected (so all mfs payload are pure trash bc people used it tons of times, and when you infect someone with one of these defender will not detected random malware, it will even know it's metasploit payload XD).
That's why I advice you to write your own payload (the best language are C, C++, C#, Nim).
You can even use python but without obfuscation it will be easily detected by AV. For other language like C# or C I can tell from experience that you don't even need to obfuscate it if you didn't copy and paste code (Only FUD for a short amount of time btw).


I've playing with some open source crypters, hope I would be able to make my own soon guys. Is there any Thread that can I use to keep learning about that?
if you using coding language like c+ i think this so helpful ; https://github.com/TheD1rkMtr

there is alot about about av evasion here too : https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/av-bypass.md
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх