Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   1245

PHANTOM EVASION 2.0.1- An Antivirus Evasion Tool :

by Pruned4773 - 21 February, 2019 - 07:20 PM
This post is by a banned member (Pruned4773) - Unhide
This post is by a banned member (Gotkafa) - Unhide
This post is by a banned member (Kaboski) - Unhide
This post is by a banned member (RaiensMarkussMors) - Unhide
This post is by a banned member (uiopu) - Unhide
This post is by a banned member (human_anon) - Unhide
7
Posts
0
Threads
4 Years of service
#6
Ijdjejd
This post is by a banned member (BlankMCPE) - Unhide
BlankMCPE  
Registered
34
Posts
4
Threads
2 Years of service
#7
(:-!)
This post is by a banned member (dickson12e) - Unhide
83
Posts
0
Threads
1 Year of service
#8
(21 February, 2019 - 07:20 PM)Pruned4773 Wrote: Show More
Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use of modules focused on polymorphic code and antivirus sandbox detection techniques. Since version 1.0 Phantom-Evasion also include a post-exploitation section dedicated to persistence and auxiliary modules.
 
New Features:



  •  
  • -Process Inject (PEinject) modules

  • -Thread Execution Hijack modules

  • -Pure C meterpreter reverse https stager (x86/x64)

  • -Non-staged msfvenom payload support

  • -Multibyte xor with progressive key-lenght

  • -Online certificate spoofer & Exe signer





[Image: FB_IMG_1546405601316.jpg]

dwaddaw

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 3 Guest(s)