Bro, when in tryin to conenct with my generated powershell in my virtualbox win10 it executs and connect is established, but once ive sent to my friend and he opened powershell encoded payload, and i got no callback from him, even tho he turned off antiviurs and firewall, whats the problem?
Fascinating how a video that actually talks about understanding the concept and learning it deeply gets so little views compared to the junk that channels like Networkchuck and David Bombal post. Another thing; what were your sources when there was no one like yourself to teach you? I mean how did you come to learn all these things deeply and avoid being stuck in a loop hole? Thank you in advance. Wish you greater luck.
Well, to each their own. David Bombal and NetworkChuck show a lot of methods, especially David Bombal. They both bring on high-end hacker guests, especially David Bombal. I'm not sure if they cover C2 frameworks. I'm here because I did a lot of searching in UA-cam. I also love zSecurity, and I paid for one of his courses on Udemy, the Python and ethical hacking course. :3
You NEED to know these 10 interview questions if you want to get into cyber security pentesting:
elevatecybersecurity.net/interview
First 🥇🏆 to reply here. 🤝🔥🤗
Great stuff! Was hoping you were going to do one on covenant
Finally C2 playllist came :) thank you sir
1:40 hell yeah. Would love more c2 related videos
Bro pretended to adjust himself on the chair to show off his triceps.
Great Video, we appreciate your work! Please do videos on covenant http redirectors and multi platform functions
Definitely more C2 content to come! Have you seen the Covenant videos I've put out so far?
@@elevatecyber5031 yes please, more C2 framework! This isn't talked about much at all, it seems!
Cool vid.
Now I am really starting to see the difference between Red Teaming & Pentesting.
Yeah my bro you the best
it was useful thank you!
Bro, when in tryin to conenct with my generated powershell in my virtualbox win10 it executs and connect is established, but once ive sent to my friend and he opened powershell encoded payload, and i got no callback from him, even tho he turned off antiviurs and firewall, whats the problem?
Why you don't install it in kali any specific reason? And how to give a proxy ip so my real ip will become safe
bro you are handsome and the only video i get from internet is this bro thanks a lot bro really i am very happy....love from india....new subscriber..
I bombed into an ERROR trying to execute dotnet run in Github... Missing files..
Hmmm, dumb question but did you google the error message? That's usually the fastest way to figure out how to solve the issue in these situations.
Fascinating how a video that actually talks about understanding the concept and learning it deeply gets so little views compared to the junk that channels like Networkchuck and David Bombal post. Another thing; what were your sources when there was no one like yourself to teach you? I mean how did you come to learn all these things deeply and avoid being stuck in a loop hole? Thank you in advance. Wish you greater luck.
Well, to each their own. David Bombal and NetworkChuck show a lot of methods, especially David Bombal. They both bring on high-end hacker guests, especially David Bombal. I'm not sure if they cover C2 frameworks. I'm here because I did a lot of searching in UA-cam. I also love zSecurity, and I paid for one of his courses on Udemy, the Python and ethical hacking course. :3