Thanks for the tutorial, I did everything, I get the message "SUCCESS: Registry persistence added" but when I restart Windows there is no connection with the agent help
You can tweak your code to not spawn anything, you can see its usage here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
But dll injection to work sometimes I think the dll we make should be exactly similar to a legitimate dll of any program that is using that dll for that dll to properly work right . If a dll we craft is not revealing the original dll that should be there then it would fail to load and execute out payload right
You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
Absolutely underrated video. Straight to the point video no bs! Thank you .
Very useful! Great video
Great work. Thank you for sharing!
Thank you for malware development tutorial,
Does someone know how to automatically run a powershell command on Havoc once the PC is infected?
A lot of ways but havoc do not support powershell you need to use powershell to stage the download and execution phase
Thanks for the tutorial, I did everything, I get the message "SUCCESS: Registry persistence added" but when I restart Windows there is no connection with the agent help
You can join the red teaming army discord, and share your issue there. Make sure to include screenshots
How can i hide the cmd pop up after establishing persistence? I supopose that is from the sharppersist exe.
You can tweak your code to not spawn anything, you can see its usage here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
But dll injection to work sometimes I think the dll we make should be exactly similar to a legitimate dll of any program that is using that dll for that dll to properly work right . If a dll we craft is not revealing the original dll that should be there then it would fail to load and execute out payload right
You are mistaking DLL Injection for DLL Hijacking / Sideloading, see the differences here: ua-cam.com/video/KhVxglO2mcM/v-deo.html
how to do it without cmd pop up beacuse i dont want other party to see it
You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp