Mr.Łønewøłf‘s Hãckføliø
Ctrlk
  • 🐺Mr.Lonewolf's Hackfolio 🧑🏻‍💻
  • 1. Recon
  • 2. Scanning
  • 3. Enumeration
  • 4. System Hacking
  • 5. Web Application VAPT
  • 6. Wireless Networks VAPT
  • 7. Mobile Application VAPT
  • 8. Reverse Engineering
  • 9. Red Team
    • Red Team Guide
    • Windows Internals
    • Active Directory
    • C2
    • Password Lists
    • Malware Creation
    • SSH Tunneling
  • 10. Blue Team
  • 11. eCPPT
Powered by GitBook
On this page
  1. 9. Red Team

Malware Creation

1. AV Evasion

LogoPythonic Malware: Evading Detection with Compiled ExecutablesMedium
LogoAntivirus Evasion with PythonMedium

2. Microsoft SDK

LogoWindows SDK - Windows app developmentMicrosoftLearn

3. Self-Signing exe

PreviousPassword ListsNextSSH Tunneling

Last updated 1 year ago

  • 1. AV Evasion
  • 2. Microsoft SDK
  • 3. Self-Signing exe
$cert = New-SelfSignedCertificate -Subject "test" -CertStoreLocation "cert:\CurrentUser\My" -HashAlgorithm sha256 -type CodeSigning

$pwd = ConvertTo-SecureString -String "123456" -Force -AsPlainText

Export-PfxCertificate -cert $cert -FilePath test.pfx -Password $pwd

signtool.exe sign /f test.pfx /fd sha256 /p 123456 test.exe

signtool.exe timestamp -t http://timestamp.digicert.com test.exe