How to Create Trojans Using Powershell



✅ Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! https://bit.ly/3AfQMpu
—————————————————————
This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
—————————————————————
🧠 My hacking courses 👇
https://zsecurity.org/courses/
—————————————————————
zSecurity Company – https://zsecurity.com/
Community – https://zsecurity.org/
Facebook – https://www.facebook.com/ZSecurity-1453250781458287/
Twitter – https://twitter.com/_zSecurity_
Instagram – https://www.instagram.com/zsecurity_org/
Linkedin – https://www.linkedin.com/company/zsecurity-org/
TikTok – https://www.tiktok.com/@zsecurity_org
—————————————————————
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
—————————————————————
This video was sponsored by DataCamp

24 comments
  1. Please check my paper that published in 2017, "Tracing intruders using web application honeypot with metasploit contents"

  2. hay i need assistance to get legit backdoor trojan for computer science research project. the malware is intended for making a supercomputer vie using people devices at idol time. by that we can share the devices CPU, GPU and memory for segmented cheaper supercomputer. at backdoor the devices will be guided on how to compute and algorithm learn at super-capacity at decentralized functioning.

    feel free to share your thoughts on the subject.

  3. i love this video but i already know this method and yeah that's great to see that because this same method i think and make a prototype of it and it work properly also implement in ms excel that download file from internet using cmd then run that file and perform the hacking after this it upload all the data to cloud really a great video for those who are learning

  4. I am cyber Security and specialize in batch scripts and your explanation is really complete.

    With a little imagination, a really powerful virus can be created in this way.

Comments are closed.