Tldr; windows defender > powershell empire. When Windows defender comes through, it's crushing everything in this video. Great intro video, but kids, exploitation is soooooo much harder than it looks! This road takes dedication.
No words alive that I can use to thank you and the effort you put in just to deliver this bowl of gold for us ..... Thanks alot God Bless You we appreciate
Another fantastic video for this wonderful course! Unfortunately I can't get the payload path into LuckyStrike, despite the fact that I have tried both writing it in lower case and changing the payload position. Anyway, thank you very much Alexis! Ps: does anyone know an alternative to LuckyStrike for Linux?
Hackersploit: could you make a video in the future about using Cobalt Strike in the red teaming environment? Ive noticed a lack of cobalt strike videos, when from what Ive seen C.S. is a very powerful tool for penetration testing?
How are you able to access local server of Kali VM on Windows VM? Please specify the network setting of both the VMs as I am unable to open Kali local server on Windows. I am using the command python -m SimpleHTTPServer 8080 on Kali VM.
Hello sir I tried the methods for creating the malicious macros using lucky strike but they keep getting flagged by av, I even bought commercial software to obfuscate the macros but same result . is it the fact that I’m using meterpreter as my payload?
@hackR Sir, it seems you are indeed involved in exquisite way in this field. Would u mind, answering me a few queries when u have time at ur convenience over fb or any other thing u like?? btw i'm interested in Network hacking,i find it very intimidating and rewarding at the same time
Hey, Love your video and I even registered and looked at your part 2 but looks like there is an issue. LuckyStrike doesn't get past AV (Defender). Not for .exes (even non-malicious ones I tested) and not for powershell scripts (also non-malicious and even non-detectable malicious ones like the net cat backdoor you obfsucated in part 2, on its own it works around AV but when put into a macro via LuckyStrike its detected). sense LuckyStrike is apparently dead and doesn't work for macro generation, do you know of a new source that does or any basic VBA scripts that work? (When I saw work I mean can execute even non-malicious exes and powershell scripts).
À amin et keep dans ce SEUL truk pr pa decu ke 2 h cam no surtt. Pa dans un an. Stop les truks pr rien. Et patienttt patiennnttt dns ce truk bnhm mais keep
Tldr; windows defender > powershell empire.
When Windows defender comes through, it's crushing everything in this video. Great intro video, but kids, exploitation is soooooo much harder than it looks! This road takes dedication.
Lol
Dam man you are killing it lately with the content. Good job, thank you
Sir great work 👍 in free of cost we are very grateful to have you 🙏
No words alive that I can use to thank you and the effort you put in just to deliver this bowl of gold for us ..... Thanks alot God Bless You we appreciate
The starting music gives me goosebump
And the level of content is insane
Thankyou Alexis
Love from India
I love your content man. Straight to the point, practical ,KISS , Will definitely become a better pentester w your channel.
Great content pls continue I haven't seen anyone is doing this much for community
Thank you
Nice insight in how a c2 works thanks
Awesome bro just keep posting this series 💯
Best forever 😘
Sir I swear to god you're the best keep it good and thank you
Where's the encode Shikata ga nai video? Good video!!
You're really good. Your videos are always insane. Thank U Sir. Lots of Love from India. 🇮🇳
Rudra can you please tell me how can I extract hashes of desired file in Linux mint or kali ??
True GEM !
gr8 content man..thank you so much
❤️ Thanks Man keep making Great content
The url for part 2 is not working
Good work done. congrats!!!
Great content!!! Thank you!
Alexis ur the man, huge thanks
Another fantastic video for this wonderful course!
Unfortunately I can't get the payload path into LuckyStrike, despite the fact that I have tried both writing it in lower case and changing the payload position.
Anyway, thank you very much Alexis!
Ps: does anyone know an alternative to LuckyStrike for Linux?
For some reason starkiller is not build/cant be install on kali linux.. there is any idea for that?
me too
awesome and super informative tnx
keep the good work going \
Love the content. How do you get your kali terminal prompt like that?
Hackersploit: could you make a video in the future about using Cobalt Strike in the red teaming environment? Ive noticed a lack of cobalt strike videos, when from what Ive seen C.S. is a very powerful tool for penetration testing?
it's expensive so generally not many people can afford it
@@lulztigre yes I know thanks
This is good content.
Thank you so much for your content and FREE!
Do you have a patreon or something?
Yah he does have patreon, look at the video description
Buddy all courses available
How are you able to access local server of Kali VM on Windows VM? Please specify the network setting of both the VMs as I am unable to open Kali local server on Windows. I am using the command python -m SimpleHTTPServer 8080 on Kali VM.
Hello sir I tried the methods for creating the malicious macros using lucky strike but they keep getting flagged by av, I even bought commercial software to obfuscate the macros but same result . is it the fact that I’m using meterpreter as my payload?
but hackers need to disable windows defender... so this exploitation doesn t still work ?
i will be happy if you do the phishing tutorial and put on your website
english is not my mother tongue , I also understood that we can utilise that on other OS than windows ?
which version of office is compatible
whats the difference between Http listener and TCP?
Part 2 videos link is not working can you update that sir
Hai, how to download these videos?
His voice is just🥵
Is that a good thing?
@@HackerSploit yes .... It feels like a Top FBI agent or a boss of some Hackers group of Russia 😝🤩
Hello, do you teach this in Ethical Hacking training on your website?
Hello hackersploit
I wanted to ask uf ther is a detailed book on this topic
Thank you
Morpheuslord
Sorry to say sir
You got that right in a amazing way but this isn't working in real life because windows defender is disabled 😤😤😤
Sir, can i ask, how can i study cybersecurity and go for a job without college degree??
@hackR Sir i beg to differ, my question's context was to ask for a roadmap if any for pursuing cyber security without college to upto Employer's level
@hackR Sir, it seems you are indeed involved in exquisite way in this field. Would u mind, answering me a few queries when u have time at ur convenience over fb or any other thing u like??
btw i'm interested in Network hacking,i find it very intimidating and rewarding at the same time
The “starkiller” cannot be opened, and the system prompts that “powershell-empire” has been installed, what should I do ε(┬┬﹏┬┬)3
The part2 link will be available for long time?
4:16 youtube sucks
Good content tho
i love u u so good
Mm si va faloir stop d rvz . Bien k hack pr soc ktaim bien russ par ex ?
First view here......
Sir can u please how we can smooth kali linux working like your kali
hahaha still talking about performance
Cnfince en tw pr dns 3 an hacker pr lcompte de ...
So you are just covering OSCP am i right? ;)
Windows disliked this ;))
20th view :)
it means that the target has to disable his anti virus lol ????
uppp
Miss the face cam
tpass jms à l action m a dit
Hey, Love your video and I even registered and looked at your part 2 but looks like there is an issue.
LuckyStrike doesn't get past AV (Defender). Not for .exes (even non-malicious ones I tested) and not for powershell scripts (also non-malicious and even non-detectable malicious ones like the net cat backdoor you obfsucated in part 2, on its own it works around AV but when put into a macro via LuckyStrike its detected).
sense LuckyStrike is apparently dead and doesn't work for macro generation, do you know of a new source that does or any basic VBA scripts that work? (When I saw work I mean can execute even non-malicious exes and powershell scripts).
Hello, we will cover AV evasion as we progress.
À amin et keep dans ce SEUL truk pr pa decu ke 2 h cam no surtt. Pa dans un an. Stop les truks pr rien. Et patienttt patiennnttt dns ce truk bnhm mais keep
?
Moscow wants your location :cv
jdjjd
أنا أموت من الفرحه إذا جاني متابع جديد 😭😭🙏🙏🙏