- 119
- 264 801
Lsecqt
Bulgaria
Приєднався 1 вер 2021
Creating PenTesting / RedTeaming Videos
Bypassing Windows Defender with this CRAZY PowerShell Trick
Uncover a CRAZY PowerShell trick for bypassing Windows Defender, a key technique often explored in malware development and penetration testing. In this detailed walkthrough, we dive into how attackers use PowerShell scripts to evade antivirus detection, revealing insights into real-world hacking strategies. Whether you're studying ethical hacking, malware creation techniques, or system defense, this video provides valuable knowledge.
⚠️ Disclaimer: This video is strictly for educational purposes. Misuse of this information is illegal. Always follow ethical hacking practices and obtain proper authorization for security testing.
📚 In this video, you’ll learn:
How PowerShell is used in malware development to bypass security mechanisms.
Step-by-step creation and execution of a bypass script.
Essential tips to protect Windows systems from script-based attacks.
🔍 Perfect for cybersecurity enthusiasts, ethical hackers, and anyone curious about PowerShell’s role in malware development.
👉 Like, share, and subscribe for more in-depth cybersecurity tutorials!
FOLLOW ME
---------------------------------------------------
Patreon: patreon.com/Lsecqt
Twitter: lsecqt
Twitch: www.twitch.tv/lsecqt
Reddit: www.reddit.com/user/lsecqt
Medium: medium.com/@lsecqt
Support my Work: www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
⚠️ Disclaimer: This video is strictly for educational purposes. Misuse of this information is illegal. Always follow ethical hacking practices and obtain proper authorization for security testing.
📚 In this video, you’ll learn:
How PowerShell is used in malware development to bypass security mechanisms.
Step-by-step creation and execution of a bypass script.
Essential tips to protect Windows systems from script-based attacks.
🔍 Perfect for cybersecurity enthusiasts, ethical hackers, and anyone curious about PowerShell’s role in malware development.
👉 Like, share, and subscribe for more in-depth cybersecurity tutorials!
FOLLOW ME
---------------------------------------------------
Patreon: patreon.com/Lsecqt
Twitter: lsecqt
Twitch: www.twitch.tv/lsecqt
Reddit: www.reddit.com/user/lsecqt
Medium: medium.com/@lsecqt
Support my Work: www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: lsecqt.github.io/Red-Teaming-Army/
Переглядів: 1 201
Відео
Nmap Tutorial for Beginners (2025)
Переглядів 337День тому
Nmap Tutorial for Beginners (2025) Learn the basics of Nmap in this Nmap Tutorial for Beginners! Whether you're diving into ethical hacking or exploring the fundamentals of penetration testing, this guide has you covered. Discover how to scan networks, identify open ports, gather essential information using Nmap and perform Active Reconnaissance. SUPPORT MY WORK BY BECOMMING PATREON patreon.com...
Let’s Build MALWARE Command and Control From Scratch!
Переглядів 75014 днів тому
Let’s Build MALWARE Command and Control From Scratch! In this malware development stream I will teach you how to create Command and Control agent with python even if you are a complete beginner. That is suitable for everyone doing information security and penetration testing. TIMESTAMPS 00:00 - Intro 00:41 - Lab Setup 03:39 - Agent Basic Usage 06:20 - Oppsec considerations 07:20 - Agent Demo 15...
HOW TO HACK ANY USER ACCOUNT WITH A SINGLE POWERSHELL COMMAND?
Переглядів 793Місяць тому
PowerShell is amazing, but I think it's made more for hackers and not for standard users. Hacking an user account might sometimes be extremely hard and complex, while other times it might be super easy. It all depends on the environment you are in! However, with the right TTPs, you can make the most out of it. This tutorial showcases how to hack an account by capturing its password hash using w...
Malware Development - Mythic C2 Agent Development Part 7
Переглядів 379Місяць тому
Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon. 🚀 In this stream, you'll learn: * The fundamentals of C2 frameworks and how they are used in penetration testing...
Malware Development - Mythic C2 Agent Development Part 6
Переглядів 569Місяць тому
Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon. 🚀 In this stream, you'll learn: * The fundamentals of C2 frameworks and how they are used in penetration testing...
Malware Development Course - Pointers and Memory
Переглядів 1,9 тис.Місяць тому
This malware development course will prepare you to write C code for offense as an ethical hacker or penetration tester. Today we focus on pointers and memory. What are they? SUPPORT MY WORK BY BECOMMING PATREON patreon.com/Lsecqt ⚠️ DISCLAIMER: This video is for educational purposes only. The techniques demonstrated are intended solely for ethical hacking and lawful security testing on systems...
Malware Development Mythic C2 Agent Development Part 5
Переглядів 552Місяць тому
Malware Development Mythic C2 Agent Development Part 5
MALWARE DEVELOPMENT - C FUNDAMENTALS (CODE WORKFLOW AND DATA TYPES)
Переглядів 5572 місяці тому
MALWARE DEVELOPMENT - C FUNDAMENTALS (CODE WORKFLOW AND DATA TYPES)
Malware Development - Mythic C2 Agent Development Part 4
Переглядів 1,6 тис.2 місяці тому
Malware Development - Mythic C2 Agent Development Part 4
How to Hack with VBA Macros: Bypassing Security and Mark of the Web
Переглядів 1,3 тис.2 місяці тому
How to Hack with VBA Macros: Bypassing Security and Mark of the Web
Best Programming Languages for Malware Development: Compiled vs Interpreted Explained
Переглядів 7832 місяці тому
Best Programming Languages for Malware Development: Compiled vs Interpreted Explained
WHY DO WE EVEN NEED MALWARE DEVELOPMENT?
Переглядів 8453 місяці тому
WHY DO WE EVEN NEED MALWARE DEVELOPMENT?
Malware Development - Creating A Custom C2 Agent Part 3
Переглядів 1,3 тис.3 місяці тому
Malware Development - Creating A Custom C2 Agent Part 3
Malware Development - Creating a Custom C2 Agent Part 2
Переглядів 1,2 тис.3 місяці тому
Malware Development - Creating a Custom C2 Agent Part 2
Malware Development - Creating a Custom C2 Agent Part 1
Переглядів 2,7 тис.3 місяці тому
Malware Development - Creating a Custom C2 Agent Part 1
How to START Ethical Hacking in 2024 - FULL ROADMAP
Переглядів 1,4 тис.3 місяці тому
How to START Ethical Hacking in 2024 - FULL ROADMAP
HOW TO CREATE MALWARE IN A WINDOWS SERVICE
Переглядів 7464 місяці тому
HOW TO CREATE MALWARE IN A WINDOWS SERVICE
Ethical Hacking Guide - Basic Lateral Movement with Mythic C2
Переглядів 8504 місяці тому
Ethical Hacking Guide - Basic Lateral Movement with Mythic C2
HOW TO SETUP YOUR INTERNAL HACKING NETWORK
Переглядів 5964 місяці тому
HOW TO SETUP YOUR INTERNAL HACKING NETWORK
HOW TO HACK INTERNAL NETWORKS WITH THIS CRAZY TOOL
Переглядів 1,6 тис.4 місяці тому
HOW TO HACK INTERNAL NETWORKS WITH THIS CRAZY TOOL
HOW TO COMPILE WINDOWS MALWARE FROM LINUX
Переглядів 9484 місяці тому
HOW TO COMPILE WINDOWS MALWARE FROM LINUX
How To Pivot Through A Network With Mythic C2 And Ligolo-NG
Переглядів 1,2 тис.5 місяців тому
How To Pivot Through A Network With Mythic C2 And Ligolo-NG
Practical Penetration Testing Guide For Hacking Databases
Переглядів 8165 місяців тому
Practical Penetration Testing Guide For Hacking Databases
HOW TO EXECUTE MALWARE FROM DLL FILE
Переглядів 1,5 тис.5 місяців тому
HOW TO EXECUTE MALWARE FROM DLL FILE
Weaponizing DLL Injection via ICONS has gone CRAZY
Переглядів 1,1 тис.6 місяців тому
Weaponizing DLL Injection via ICONS has gone CRAZY
Inject MALICIOUS code into Explorer exe With This CRAZY Tool
Переглядів 1,7 тис.6 місяців тому
Inject MALICIOUS code into Explorer exe With This CRAZY Tool
This 0DAY is CRAZY - AMSI Bypass from OFFSEC
Переглядів 2,1 тис.6 місяців тому
This 0DAY is CRAZY - AMSI Bypass from OFFSEC
HOW TO CONVERT PYTHON SCRIPT TO EXE | ETHICAL HACKING TUTORIAL
Переглядів 9036 місяців тому
HOW TO CONVERT PYTHON SCRIPT TO EXE | ETHICAL HACKING TUTORIAL
How To Use DISCORD As C2 Traffic Broker with Mythic C2
Переглядів 1,6 тис.7 місяців тому
How To Use DISCORD As C2 Traffic Broker with Mythic C2
Beast!
But microsoft will patch this if is too public😢. Same thing happened to PyCrypter of machine1337
Amazing video
great vid man
Absolutly amazing ❤
Nice stuff
Thanks , although im more interested in md but would like to see advanced real life nmap
Display of great quality but the code should be zoomed in all of your future videos
Appreciate your feedback
Nice video, I like your obsidian illustrations ❤️💥
Thanks, these are from draw.io but still the idea is important.
Keep going man, I appreciate high quality content!😊
Oh yeah gonna looveeeeee itt
Sir your content is really great. But i can not patreon using paypal.. other way ???
So sql server and dc both use static IPs, beebox is dynamic and pfsense is dynamic but since the server is static it will always assign it same ip address. Internal IPs have been configured within pfsense with corresponding device MAC addresses and then a custom bridged network has been created to route traffic for and from any of the internal hosts through pfsense there by using pfsense public ip to interface with other hosts on the network.
pfsense is also static and it has 2 adapters. Wan is bridged vm adapter and lan is internal network 172.16.16.0/24. Then you allow outbound traffic and each machine from 172.16.16.0/24 can access anything the bridged network can.
@ thank got it
One of the best videos so far. Just bought a new hp z640 workstation and I’m about to setup my hacking lab
can you make a red team infra course?
Yes, after I finish the maldev one
@@Lsecqt that will be great, I can pay for a decent end to end red team infra training but the scarcity of it.
I wanted this
Keep going please , waiting for the full course
Nice thumbnail
Hi sir, how can i subscribe to your creative red teaming private videos and methodology? Can you teach how an APT approach to website or web app exploitation please
Hello, of course you can subscribe. Prepare your video ideas and share them there.
i did this 2 days ago and found you uploaded the same tutorial Haha xD
All SCCM accounts are monitored by AAD and Identity management which run " Behavior AI " if you going to use it to do this type of hacking it will detect the user is doing something it is not suppose to and will lock the account for MFA release, cool clip tho, if you want to know more about why we do it reach out to me, ill give you a enviroment you can run test in... HEAVY SECURITY policy's we use for red teaming
Bro ,can you help me in reverse engineering for exe file , i lost the installer and the program from 2000 , it's difficult because he ask password in some dll file , i think he look for password in same path , if he didn't find this path he exit without any message
Sorry man I am bad at reversing
@Lsecqt Thank you anyway 🥰❤️
learned something new today, thanks 4 this video!
What remote client do you use to connect your server running the vms please?
Yep I have a server with VMs and I use rdp most of the time
Great video.
great tutorial:)
Goood 👍
you are the best broo ❤❤❤❤
Damn i was working missed that
how to do it without cmd pop up beacuse i dont want other party to see it
You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
you dont have these videos available in your paetron
They are here, they are publicly available, why do they need to also be there?
Very use full session.
Huge respect for sticking with it. Coming to terms with that skill being the most important in this field! Just keep trying.
hello a question the malware dev course is a single payment or is it a subscription ?
Single payment. It is in active development but if you buy it you will have live access to all new videos.
Also, by becoming a Patreon you will have access to the videos, and to other useful projects based on your subscription level.
best lecture ever! great content
Hey don't Stop posting, noone is here, love your video
your amazing man plzz tell me how to study hacking and coding in same time ,new member in channel:0
DM me on discord
veryy good video thank you hope more videos for malware algorithm
Why Sliver c2 payload is so large in size?
Most of c2 payloads are large because they are complex and can do a lot of stuff
Because sliver actively uses GO lang
Keep going my friend 👏🔥💪
Bro you're just making this sound 100x more difficult than it has to be
Even If you scan a hello world executable, it is still detected as malware on virustotal.
From which vendors?
Thank you, 🔥
best fr
Thanks 🙏