During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
anti-virus-evading-payloads's Introduction
๐ there, I'm Olajuwon - aka โจ D3epDiv3r โจ
I'm an Ethical Hacking and Cybersecurity Student, Full Stack Web Developer, and a Technological Enthusiast
๐ฑ Iโm currently learning everything ๐คฃ
๐ฏ Iโm looking to collaborate with other like-minded individuals
โก Fun facts: I love Hacking. I love Coding. I love Computers.