✅ Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! https://bit.ly/3AfQMpu
—————————————————————
This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
—————————————————————
🧠 My hacking courses 👇
https://zsecurity.org/courses/
—————————————————————
zSecurity Company – https://zsecurity.com/
Community – https://zsecurity.org/
Facebook – https://www.facebook.com/ZSecurity-1453250781458287/
Twitter – https://twitter.com/_zSecurity_
Instagram – https://www.instagram.com/zsecurity_org/
Linkedin – https://www.linkedin.com/company/zsecurity-org/
TikTok – https://www.tiktok.com/@zsecurity_org
—————————————————————
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
—————————————————————
This video was sponsored by DataCamp
How to Create Trojans Using Powershell
24 comments
Comments are closed.
SSuperb Bro I have Ever Seen such a clear explanation 🤝
.exe different .png :)))))
Please check my paper that published in 2017, "Tracing intruders using web application honeypot with metasploit contents"
hay i need assistance to get legit backdoor trojan for computer science research project. the malware is intended for making a supercomputer vie using people devices at idol time. by that we can share the devices CPU, GPU and memory for segmented cheaper supercomputer. at backdoor the devices will be guided on how to compute and algorithm learn at super-capacity at decentralized functioning.
feel free to share your thoughts on the subject.
What if the user has enable to see the extensions of the files? In that case it will see that the image is .exe
i love this video but i already know this method and yeah that's great to see that because this same method i think and make a prototype of it and it work properly also implement in ms excel that download file from internet using cmd then run that file and perform the hacking after this it upload all the data to cloud really a great video for those who are learning
This method is as useless as you look cheap knok off which won't work
What if the user deletes the file?
Link for the evil file directory please.
Actually thought that this video was a ad bc of the thumbnail
can we create a a trojan for iphone?
very educative
u r a genius !!!
Plz one vedio complet fone take live location
Can track hindenly fone gps live location
Is it working on hackin ios ?
Can we send it to an android user will it work?
doesnt work
Ahhhhh okay i gotta write this down so i can defend properly against it
This is your best tuturial for ever. Thanks à lot master. 👏👏👏
some love 🙂
Will be better and to use Invisibile aplication opstion 😏😏
I am cyber Security and specialize in batch scripts and your explanation is really complete.
With a little imagination, a really powerful virus can be created in this way.
please how did you hosted your apache server on a public ip address ??