Mr.Łønewøłf‘s Hãckføliø
search
⌘Ctrlk
Mr.Łønewøłf‘s Hãckføliø
  • 🐺Mr.Lonewolf's Hackfolio 🧑🏻‍💻
  • 1. Recon
  • 2. Scanning
  • 3. Enumeration
  • 4. System Hacking
  • 5. Web Application VAPT
  • 6. Wireless Networks VAPT
  • 7. Mobile Application VAPT
  • 8. Reverse Engineering
  • 9. Red Team
    • Red Team Guide
    • Windows Internals
    • Active Directory
    • C2
    • Password Lists
    • Malware Creation
    • SSH Tunneling
  • 10. Blue Team
  • 11. eCPPT
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 9. Red Team

Malware Creation

hashtag
1. AV Evasion

LogoPythonic Malware: Evading Detection with Compiled ExecutablesMediumchevron-right
LogoAntivirus Evasion with PythonMediumchevron-right

hashtag
2. Microsoft SDK

LogoWindows SDK overview - Windows appsMicrosoftLearnchevron-right

hashtag
3. Self-Signing exe

PreviousPassword Listschevron-leftNextSSH Tunnelingchevron-right

Last updated 2 years ago

  • 1. AV Evasion
  • 2. Microsoft SDK
  • 3. Self-Signing exe
$cert = New-SelfSignedCertificate -Subject "test" -CertStoreLocation "cert:\CurrentUser\My" -HashAlgorithm sha256 -type CodeSigning

$pwd = ConvertTo-SecureString -String "123456" -Force -AsPlainText

Export-PfxCertificate -cert $cert -FilePath test.pfx -Password $pwd

signtool.exe sign /f test.pfx /fd sha256 /p 123456 test.exe

signtool.exe timestamp -t http://timestamp.digicert.com test.exe