Windows Malware RAT - JSCat (Windows Defender Bypass)
HTML-код
- Опубликовано: 26 окт 2024
- Be better than yesterday -
In this video, we demonstrate the usage of a publicly available Windows RAT Malware known as JSCat.
It was possible to bypass the Windows Defender detection triggered and successfully establish a callback to the JSCat remote server. The session established was also functional and OS command execution was possible without triggering any detection. In addition, a manual quick scan was also initiated.
Stay connected:
Twitter: / gemini_security
Udemy: www.udemy.com/...
Facebook: www.facebook.c...
Github: github.com/gem...
Discord: / discord
Link to JSCat Github Repository:
github.com/han...
Gemini Security Awesome Hacking T-Shirts - Support the channel:
www.redbubble....
Amazing guys,I going to try now,if available I will comment under
hey the cmd prompt where we execute this looks like standby
is there anyway to hide the cmd prompt?
i mean to background it
TIA
is there a way to contact you?
Nice video bro :)
Hello,
Thanks!! I am glad you enjoyed it!
Cheers!
plz make video about post exploitation with evading defenses
Hello!
Thanks for the feedback. Is there any specific post-exploitation activity that you are particularly interested in? Persistence? Credentials dumping?
Cheers!
@@gemini_security Persistence to data exfiltration
Does it work
😎😎😎😎
He still bypasses
awesome - glad to hear that!
@@gemini_security It was a question 😅
@@Lysergiquesthen put a question mark