Go Back   Carder.life > [en] International Forum > Hacking & Coding



 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
  #1  
Old 01-15-2025, 03:41 AM

feadon feadon is offline
Join Date: Oct 2022
Posts: 0
Default


Creating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has become increasingly difficult on modern Windows endpoints.
In fact, even benign programs seem to get blocked immediately after touching disk. This is just one of the reasons red teamers have moved away from popular frameworks such as Veil-Evasion and onto bigger-better things.
This post revisits compiled Pythons use in offensive security testing and shares experiences launching Meterpreter shells on a fully patched Windows 10 system against Windows Defender.

https://breachtactics.com/blog/pythonic-malware/
 

Tags
NULL


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT. The time now is 07:33 PM.