Windows Malware RAT - JSCat (Windows Defender Bypass)

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024
  • Be better than yesterday -
    In this video, we demonstrate the usage of a publicly available Windows RAT Malware known as JSCat.
    It was possible to bypass the Windows Defender detection triggered and successfully establish a callback to the JSCat remote server. The session established was also functional and OS command execution was possible without triggering any detection. In addition, a manual quick scan was also initiated.
    Stay connected:
    Twitter: / gemini_security
    Udemy: www.udemy.com/...
    Facebook: www.facebook.c...
    Github: github.com/gem...
    Discord: / discord
    Link to JSCat Github Repository:
    github.com/han...
    Gemini Security Awesome Hacking T-Shirts - Support the channel:
    www.redbubble....

Комментарии • 15

  • @黎展帆
    @黎展帆 Год назад +1

    Amazing guys,I going to try now,if available I will comment under

  • @b4dboy_17
    @b4dboy_17 Год назад +1

    hey the cmd prompt where we execute this looks like standby
    is there anyway to hide the cmd prompt?
    i mean to background it
    TIA

  • @ec0logiskasec045
    @ec0logiskasec045 Год назад +1

    is there a way to contact you?

  • @nhoxxz2282
    @nhoxxz2282 Год назад +1

    Nice video bro :)

  • @hiddengo3232
    @hiddengo3232 Год назад +1

    plz make video about post exploitation with evading defenses

    • @gemini_security
      @gemini_security  Год назад

      Hello!
      Thanks for the feedback. Is there any specific post-exploitation activity that you are particularly interested in? Persistence? Credentials dumping?
      Cheers!

    • @hiddengo3232
      @hiddengo3232 Год назад

      @@gemini_security Persistence to data exfiltration

  • @aki-fi3gk
    @aki-fi3gk 2 месяца назад

    Does it work

  • @nhoxxz2282
    @nhoxxz2282 Год назад +1

    😎😎😎😎

  • @Lysergiques
    @Lysergiques Год назад +2

    He still bypasses