Shellcode Loader/Execute Shellcode - Automate with Python Programming! [Part 2]

Поділитися
Вставка
  • Опубліковано 3 січ 2025

КОМЕНТАРІ • 37

  • @chizzlemo3094
    @chizzlemo3094 Рік тому +3

    this is the best red team channel on yt, hope for more videos in 2024 !

  • @NikolasKerekes
    @NikolasKerekes Рік тому +2

    Awesome! Seems that MS has reacted already as my Defender was bitching immediatly after execution, but still - very cool !

    • @gemini_security
      @gemini_security  Рік тому

      Hey man! Thanks for giving it a try.
      I am sure you can get it working again by adding more conditions to it, or doing a XOR + Base64 on your payload.
      Cheers!

  • @hiddengo3232
    @hiddengo3232 10 місяців тому +2

    where are you bro?

  • @namemcnamey4207
    @namemcnamey4207 8 місяців тому +1

    Recently found this channel and its a great resource keep up the great content.

  • @safe957
    @safe957 Рік тому +2

    why not do a Q&A? id love to know how and where u learnt to be so good at Coding and malware development

  • @tlykuyiyhaa8382
    @tlykuyiyhaa8382 Рік тому +2

    You are the BEST un security, amazing

  • @jordanbourcier2424
    @jordanbourcier2424 8 місяців тому +1

    Awesome stuff man!

  • @QusarWilson
    @QusarWilson Рік тому +2

    This is really nice. Amazing work!

  • @GAMEloft453
    @GAMEloft453 11 місяців тому +1

    Hello!
    Please my question may be out of topic here.
    But from your video on ketloggers using chatGPT, I would like to know if that very code can run on an Android device like the Samsung Galaxy Z?

  • @cristianandrade3207
    @cristianandrade3207 Рік тому +1

    Hi friend, we are waiting for your spectacular videos. They are usefull and interestings. I hope See You soon!!!

  • @nkaslq1694
    @nkaslq1694 Рік тому +1

    still working? because i don't get any reverse connection to my kali machine, i followed all the steps and i tried everything, maybe i'm doing something wrong but once i run on my windows machine "poc.exe example" i don't get any connection back

  • @patrickdee7365
    @patrickdee7365 Рік тому +1

    Can you please make sure to save everything to a second plattform in case you get taken down?

  • @JasonCage-y2d
    @JasonCage-y2d Рік тому +1

    Very interesting. But will the reverse connection be cut when the command prompt exits out of the executable? How do you make it persist even when the command prompt closes?

    • @SolitaryElite
      @SolitaryElite Рік тому +1

      you need to make another file that will install the main exe and then run it along with an argument (for persistence you can just make the dropper copy itself to startup)

    • @JasonCage-y2d
      @JasonCage-y2d Рік тому +1

      @@SolitaryElite oh ok. I saw a method where the executable only has to run once, then it will create a reverse connection to our machine. After running the executable, the command prompt can be closed.

  • @ilmurlocdiplomato3071
    @ilmurlocdiplomato3071 10 місяців тому +1

    Soprry to inform u that this method seams dont work anymore, or at least for me when i download the .exe (with xor enc) its detected immidialty as malware

  • @Mohitkumar-ug8jq
    @Mohitkumar-ug8jq 2 місяці тому +1

    can you provide the final .cpp and .py files ?

  • @8lank820
    @8lank820 11 місяців тому +1

    Is this detectable in kaspersky free?

  • @hiddengo3232
    @hiddengo3232 Рік тому +2

    waiting for next video

  • @firosiam7786
    @firosiam7786 Рік тому +1

    No vedios bro for 1 month how are you are you okay

  • @hiddengo3232
    @hiddengo3232 7 місяців тому +1

    where r u bro?

    • @gemini_security
      @gemini_security  7 місяців тому

      Hello,
      I am still here and I am doing fine! I hope that you're doing fine as well!

    • @hiddengo3232
      @hiddengo3232 7 місяців тому

      @@gemini_security when is u r next video?

    • @hiddengo3232
      @hiddengo3232 7 місяців тому

      @@gemini_security when is u r next video?

  • @sul3y
    @sul3y Рік тому +1

    Nah, bro windows didn’t perform xor decryption, the shellcode is detected after you decrypted and pass it into virtualAlloc and MoveMemory functions

  • @wild_elliot
    @wild_elliot Рік тому +1

    Keep up the good work (y)

  • @azarhackon
    @azarhackon Рік тому +1

    Thank you so much sir

  • @Mauretto-j7u
    @Mauretto-j7u 2 місяці тому +1

    yes and no i suppose.

  • @alumtech4083
    @alumtech4083 Рік тому +1

    Hi gemini, love the content, can u please load the code used. Thank u!❤

    • @gemini_security
      @gemini_security  Рік тому +1

      Sure, uploaded - github.com/gemini-security/shellcode101

  • @hiddengo3232
    @hiddengo3232 10 місяців тому +1

    ????

  • @alumtech4083
    @alumtech4083 Рік тому +1

    ❤❤

  • @emeraldblake4425
    @emeraldblake4425 Рік тому +1

    Promo*SM 🌺

  • @hiddengo3232
    @hiddengo3232 9 місяців тому +1

    hlo bro

  • @hiddengo3232
    @hiddengo3232 10 місяців тому +1

    hlo