Lsecqt
Lsecqt
  • 119
  • 264 801
Bypassing Windows Defender with this CRAZY PowerShell Trick
Uncover a CRAZY PowerShell trick for bypassing Windows Defender, a key technique often explored in malware development and penetration testing. In this detailed walkthrough, we dive into how attackers use PowerShell scripts to evade antivirus detection, revealing insights into real-world hacking strategies. Whether you're studying ethical hacking, malware creation techniques, or system defense, this video provides valuable knowledge.
⚠️ Disclaimer: This video is strictly for educational purposes. Misuse of this information is illegal. Always follow ethical hacking practices and obtain proper authorization for security testing.
📚 In this video, you’ll learn:
How PowerShell is used in malware development to bypass security mechanisms.
Step-by-step creation and execution of a bypass script.
Essential tips to protect Windows systems from script-based attacks.
🔍 Perfect for cybersecurity enthusiasts, ethical hackers, and anyone curious about PowerShell’s role in malware development.
👉 Like, share, and subscribe for more in-depth cybersecurity tutorials!
FOLLOW ME
---------------------------------------------------
Patreon: patreon.com/Lsecqt
Twitter: lsecqt
Twitch: www.twitch.tv/lsecqt
Reddit: www.reddit.com/user/lsecqt
Medium: medium.com/@lsecqt
Support my Work: www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
Переглядів: 1 201

Відео

Nmap Tutorial for Beginners (2025)
Переглядів 337День тому
Nmap Tutorial for Beginners (2025) Learn the basics of Nmap in this Nmap Tutorial for Beginners! Whether you're diving into ethical hacking or exploring the fundamentals of penetration testing, this guide has you covered. Discover how to scan networks, identify open ports, gather essential information using Nmap and perform Active Reconnaissance. SUPPORT MY WORK BY BECOMMING PATREON patreon.com...
Let’s Build MALWARE Command and Control From Scratch!
Переглядів 75014 днів тому
Let’s Build MALWARE Command and Control From Scratch! In this malware development stream I will teach you how to create Command and Control agent with python even if you are a complete beginner. That is suitable for everyone doing information security and penetration testing. TIMESTAMPS 00:00 - Intro 00:41 - Lab Setup 03:39 - Agent Basic Usage 06:20 - Oppsec considerations 07:20 - Agent Demo 15...
HOW TO HACK ANY USER ACCOUNT WITH A SINGLE POWERSHELL COMMAND?
Переглядів 793Місяць тому
PowerShell is amazing, but I think it's made more for hackers and not for standard users. Hacking an user account might sometimes be extremely hard and complex, while other times it might be super easy. It all depends on the environment you are in! However, with the right TTPs, you can make the most out of it. This tutorial showcases how to hack an account by capturing its password hash using w...
Malware Development - Mythic C2 Agent Development Part 7
Переглядів 379Місяць тому
Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon. 🚀 In this stream, you'll learn: * The fundamentals of C2 frameworks and how they are used in penetration testing...
Malware Development - Mythic C2 Agent Development Part 6
Переглядів 569Місяць тому
Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon. 🚀 In this stream, you'll learn: * The fundamentals of C2 frameworks and how they are used in penetration testing...
Malware Development Course - Pointers and Memory
Переглядів 1,9 тис.Місяць тому
This malware development course will prepare you to write C code for offense as an ethical hacker or penetration tester. Today we focus on pointers and memory. What are they? SUPPORT MY WORK BY BECOMMING PATREON patreon.com/Lsecqt ⚠️ DISCLAIMER: This video is for educational purposes only. The techniques demonstrated are intended solely for ethical hacking and lawful security testing on systems...
Malware Development Mythic C2 Agent Development Part 5
Переглядів 552Місяць тому
Malware Development Mythic C2 Agent Development Part 5
MALWARE DEVELOPMENT - C FUNDAMENTALS (CODE WORKFLOW AND DATA TYPES)
Переглядів 5572 місяці тому
MALWARE DEVELOPMENT - C FUNDAMENTALS (CODE WORKFLOW AND DATA TYPES)
Malware Development - Mythic C2 Agent Development Part 4
Переглядів 1,6 тис.2 місяці тому
Malware Development - Mythic C2 Agent Development Part 4
How to Hack with VBA Macros: Bypassing Security and Mark of the Web
Переглядів 1,3 тис.2 місяці тому
How to Hack with VBA Macros: Bypassing Security and Mark of the Web
Best Programming Languages for Malware Development: Compiled vs Interpreted Explained
Переглядів 7832 місяці тому
Best Programming Languages for Malware Development: Compiled vs Interpreted Explained
WHY DO WE EVEN NEED MALWARE DEVELOPMENT?
Переглядів 8453 місяці тому
WHY DO WE EVEN NEED MALWARE DEVELOPMENT?
Malware Development - Creating A Custom C2 Agent Part 3
Переглядів 1,3 тис.3 місяці тому
Malware Development - Creating A Custom C2 Agent Part 3
Malware Development - Creating a Custom C2 Agent Part 2
Переглядів 1,2 тис.3 місяці тому
Malware Development - Creating a Custom C2 Agent Part 2
Malware Development - Creating a Custom C2 Agent Part 1
Переглядів 2,7 тис.3 місяці тому
Malware Development - Creating a Custom C2 Agent Part 1
How to START Ethical Hacking in 2024 - FULL ROADMAP
Переглядів 1,4 тис.3 місяці тому
How to START Ethical Hacking in 2024 - FULL ROADMAP
HOW TO CREATE MALWARE IN A WINDOWS SERVICE
Переглядів 7464 місяці тому
HOW TO CREATE MALWARE IN A WINDOWS SERVICE
Ethical Hacking Guide - Basic Lateral Movement with Mythic C2
Переглядів 8504 місяці тому
Ethical Hacking Guide - Basic Lateral Movement with Mythic C2
HOW TO SETUP YOUR INTERNAL HACKING NETWORK
Переглядів 5964 місяці тому
HOW TO SETUP YOUR INTERNAL HACKING NETWORK
HOW TO HACK INTERNAL NETWORKS WITH THIS CRAZY TOOL
Переглядів 1,6 тис.4 місяці тому
HOW TO HACK INTERNAL NETWORKS WITH THIS CRAZY TOOL
HOW TO COMPILE WINDOWS MALWARE FROM LINUX
Переглядів 9484 місяці тому
HOW TO COMPILE WINDOWS MALWARE FROM LINUX
How To Pivot Through A Network With Mythic C2 And Ligolo-NG
Переглядів 1,2 тис.5 місяців тому
How To Pivot Through A Network With Mythic C2 And Ligolo-NG
Practical Penetration Testing Guide For Hacking Databases
Переглядів 8165 місяців тому
Practical Penetration Testing Guide For Hacking Databases
HOW TO EXECUTE MALWARE FROM DLL FILE
Переглядів 1,5 тис.5 місяців тому
HOW TO EXECUTE MALWARE FROM DLL FILE
Weaponizing DLL Injection via ICONS has gone CRAZY
Переглядів 1,1 тис.6 місяців тому
Weaponizing DLL Injection via ICONS has gone CRAZY
Inject MALICIOUS code into Explorer exe With This CRAZY Tool
Переглядів 1,7 тис.6 місяців тому
Inject MALICIOUS code into Explorer exe With This CRAZY Tool
This 0DAY is CRAZY - AMSI Bypass from OFFSEC
Переглядів 2,1 тис.6 місяців тому
This 0DAY is CRAZY - AMSI Bypass from OFFSEC
HOW TO CONVERT PYTHON SCRIPT TO EXE | ETHICAL HACKING TUTORIAL
Переглядів 9036 місяців тому
HOW TO CONVERT PYTHON SCRIPT TO EXE | ETHICAL HACKING TUTORIAL
How To Use DISCORD As C2 Traffic Broker with Mythic C2
Переглядів 1,6 тис.7 місяців тому
How To Use DISCORD As C2 Traffic Broker with Mythic C2

КОМЕНТАРІ

  • @thanatosdeathgod
    @thanatosdeathgod 13 годин тому

    Beast!

  • @thefunnychannel6640
    @thefunnychannel6640 2 дні тому

    But microsoft will patch this if is too public😢. Same thing happened to PyCrypter of machine1337

  • @Nitin-xf4by
    @Nitin-xf4by 5 днів тому

    Amazing video

  • @SolitaryElite
    @SolitaryElite 5 днів тому

    great vid man

  • @Kingdd1os
    @Kingdd1os 6 днів тому

    Absolutly amazing ❤

  • @johnymnemonick2559
    @johnymnemonick2559 11 днів тому

    Nice stuff

  • @Tactical_Ara
    @Tactical_Ara 11 днів тому

    Thanks , although im more interested in md but would like to see advanced real life nmap

  • @muhammadraad6354
    @muhammadraad6354 12 днів тому

    Display of great quality but the code should be zoomed in all of your future videos

    • @Lsecqt
      @Lsecqt 11 днів тому

      Appreciate your feedback

  • @richardghani5458
    @richardghani5458 12 днів тому

    Nice video, I like your obsidian illustrations ❤️💥

    • @Lsecqt
      @Lsecqt 12 днів тому

      Thanks, these are from draw.io but still the idea is important.

  • @HackRonin
    @HackRonin 12 днів тому

    Keep going man, I appreciate high quality content!😊

  • @angkanchanda1801
    @angkanchanda1801 12 днів тому

    Oh yeah gonna looveeeeee itt

  • @ytg6663
    @ytg6663 14 днів тому

    Sir your content is really great. But i can not patreon using paypal.. other way ???

  • @richardghani5458
    @richardghani5458 15 днів тому

    So sql server and dc both use static IPs, beebox is dynamic and pfsense is dynamic but since the server is static it will always assign it same ip address. Internal IPs have been configured within pfsense with corresponding device MAC addresses and then a custom bridged network has been created to route traffic for and from any of the internal hosts through pfsense there by using pfsense public ip to interface with other hosts on the network.

    • @Lsecqt
      @Lsecqt 13 днів тому

      pfsense is also static and it has 2 adapters. Wan is bridged vm adapter and lan is internal network 172.16.16.0/24. Then you allow outbound traffic and each machine from 172.16.16.0/24 can access anything the bridged network can.

    • @richardghani5458
      @richardghani5458 13 днів тому

      @ thank got it

  • @richardghani5458
    @richardghani5458 15 днів тому

    One of the best videos so far. Just bought a new hp z640 workstation and I’m about to setup my hacking lab

  • @palevelmode
    @palevelmode 17 днів тому

    can you make a red team infra course?

    • @Lsecqt
      @Lsecqt 17 днів тому

      Yes, after I finish the maldev one

    • @palevelmode
      @palevelmode 17 днів тому

      @@Lsecqt that will be great, I can pay for a decent end to end red team infra training but the scarcity of it.

  • @tanveeraalam3271
    @tanveeraalam3271 17 днів тому

    I wanted this

  • @Tactical_Ara
    @Tactical_Ara 17 днів тому

    Keep going please , waiting for the full course

  • @richardghani5458
    @richardghani5458 17 днів тому

    Nice thumbnail

  • @ytg6663
    @ytg6663 24 дні тому

    Hi sir, how can i subscribe to your creative red teaming private videos and methodology? Can you teach how an APT approach to website or web app exploitation please

    • @Lsecqt
      @Lsecqt 23 дні тому

      Hello, of course you can subscribe. Prepare your video ideas and share them there.

  • @MdSubhan-ku4gj
    @MdSubhan-ku4gj 28 днів тому

    i did this 2 days ago and found you uploaded the same tutorial Haha xD

  • @RemainZStudio
    @RemainZStudio 28 днів тому

    All SCCM accounts are monitored by AAD and Identity management which run " Behavior AI " if you going to use it to do this type of hacking it will detect the user is doing something it is not suppose to and will lock the account for MFA release, cool clip tho, if you want to know more about why we do it reach out to me, ill give you a enviroment you can run test in... HEAVY SECURITY policy's we use for red teaming

  • @AhmedDridi-fz4sw
    @AhmedDridi-fz4sw Місяць тому

    Bro ,can you help me in reverse engineering for exe file , i lost the installer and the program from 2000 , it's difficult because he ask password in some dll file , i think he look for password in same path , if he didn't find this path he exit without any message

    • @Lsecqt
      @Lsecqt 29 днів тому

      Sorry man I am bad at reversing

    • @AhmedDridi-fz4sw
      @AhmedDridi-fz4sw 29 днів тому

      @Lsecqt Thank you anyway 🥰❤️

  • @detective5253
    @detective5253 Місяць тому

    learned something new today, thanks 4 this video!

  • @richardghani5458
    @richardghani5458 Місяць тому

    What remote client do you use to connect your server running the vms please?

    • @Lsecqt
      @Lsecqt Місяць тому

      Yep I have a server with VMs and I use rdp most of the time

  • @calldrive9456
    @calldrive9456 Місяць тому

    Great video.

  • @SolitaryElite
    @SolitaryElite Місяць тому

    great tutorial:)

  • @kristiyanbaltov2966
    @kristiyanbaltov2966 Місяць тому

    Goood 👍

  • @aminhasni-o7x
    @aminhasni-o7x Місяць тому

    you are the best broo ❤❤❤❤

  • @Tactical_Ara
    @Tactical_Ara Місяць тому

    Damn i was working missed that

  • @thefunnychannel6640
    @thefunnychannel6640 Місяць тому

    how to do it without cmd pop up beacuse i dont want other party to see it

    • @Lsecqt
      @Lsecqt Місяць тому

      You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp

  • @harryuzezi3995
    @harryuzezi3995 Місяць тому

    you dont have these videos available in your paetron

    • @Lsecqt
      @Lsecqt Місяць тому

      They are here, they are publicly available, why do they need to also be there?

  • @calldrive9456
    @calldrive9456 Місяць тому

    Very use full session.

  • @tingootango4927
    @tingootango4927 Місяць тому

    Huge respect for sticking with it. Coming to terms with that skill being the most important in this field! Just keep trying.

  • @JuanFelix-
    @JuanFelix- Місяць тому

    hello a question the malware dev course is a single payment or is it a subscription ?

    • @Lsecqt
      @Lsecqt Місяць тому

      Single payment. It is in active development but if you buy it you will have live access to all new videos.

    • @Lsecqt
      @Lsecqt Місяць тому

      Also, by becoming a Patreon you will have access to the videos, and to other useful projects based on your subscription level.

  • @muhammadraad6354
    @muhammadraad6354 Місяць тому

    best lecture ever! great content

  • @tanveeraalam3271
    @tanveeraalam3271 Місяць тому

    Hey don't Stop posting, noone is here, love your video

  • @inconnue_1475
    @inconnue_1475 Місяць тому

    your amazing man plzz tell me how to study hacking and coding in same time ,new member in channel:0

    • @Lsecqt
      @Lsecqt Місяць тому

      DM me on discord

  • @inconnue_1475
    @inconnue_1475 Місяць тому

    veryy good video thank you hope more videos for malware algorithm

  • @MichaelDedos
    @MichaelDedos Місяць тому

    Why Sliver c2 payload is so large in size?

    • @Lsecqt
      @Lsecqt Місяць тому

      Most of c2 payloads are large because they are complex and can do a lot of stuff

    • @yashaivanov5306
      @yashaivanov5306 Місяць тому

      Because sliver actively uses GO lang

  • @wiksilz1387
    @wiksilz1387 Місяць тому

    Keep going my friend 👏🔥💪

  • @thewhiteape1686
    @thewhiteape1686 Місяць тому

    Bro you're just making this sound 100x more difficult than it has to be

  • @ytg6663
    @ytg6663 Місяць тому

    Even If you scan a hello world executable, it is still detected as malware on virustotal.

    • @Lsecqt
      @Lsecqt Місяць тому

      From which vendors?

  • @accountdeleted
    @accountdeleted Місяць тому

    Thank you, 🔥

  • @MdSubhan-ku4gj
    @MdSubhan-ku4gj Місяць тому

    best fr

  • @Tactical_Ara
    @Tactical_Ara Місяць тому

    Thanks 🙏