Skip to content
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Friday, Feb 26, 2021

Day: 4 January 2021

Create FUD (Fully Undetectable) Payload for Windows 10

Shubham Goyal Shubham Goyal4 January 20214 January 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we are going to talk about an open source tool called “Defeat-Defender“, which is coded in batch language and designed to defeat the security defender of windows operating system and to get access to the system. Keep in mind that it is capable of bypassing […]

Continue Reading

Phantom Evasion – Create Windows 10 FUD Payload

Shubham Goyal Shubham Goyal4 January 20216 January 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, today we are going to discuss over the same topic over which we had discuss in our previous article called “how to bypass windows 10 defender” but in this tutorial, we will use different tool called “Phantom-Evasion”. Phantom-Evasion is an antivirus evasion tool written in python (both compatible […]

Continue Reading

Join our Live Training Courses

Follow us

  • E-mail
  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

Subscribe to Blog via Email

Enter your email address to subscribe to this blog

Join 75 other subscribers.

Search Form

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Close

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
× How can I help you?