Quantcast
Browsing latest articles
Browse All 5 View Live

Create your own Trojan binder

1. Introduction Sometimes you would like to merge your own piece of code (Trojan, Joke, …) to a legitimate executable file, under Windows or Linux. Unfortunately, binder tools you’ve downloaded from...

View Article


Manage your evil code with DNS

1. Introduction This post provides an easy way to manage your software (evil or not) remotely, by using a simple DNS polling function. Imagine that you have a small piece of code acting as an ethical...

View Article


Image may be NSFW.
Clik here to view.

Reverse SSL backdoor with socat and metasploit (and proxies)

1. Introduction This is a short article explaining how to quickly create a reverse backdoor: for Windows or Linux (this article will focus on Windows) using encrypted communication inside an SSL tunnel...

View Article

cD00r Knocking backdoor (improved)

1. Introduction Standard backdoors and remote access services have one major drawback: The port’s they are listening on are visible on the system console as well as from outside (through port...

View Article

Image may be NSFW.
Clik here to view.

Antivirus Sandbox Evasion (part3) – The Tool

Ok, here we are.. Thank you for your patience. It is time to release the version 0.1 of the “tool“.. The archive is composed of: An EXE template (ultimate-payload-template1.exe) which manage the...

View Article

Browsing latest articles
Browse All 5 View Live