Joan Estebanjanestebans.hashnode.devยทJun 16, 2023Basic Windows AV Bypass - Part 5 - Embed and Execute the ShellcodeNow we can finally start coding our trojan. The malware we are going to use for testing is a reverse TCP shell from Metasploit. Before coding the shellcode loader, let's see if AVs can detect the reverse shell executable. To generate the reverse TCP ...40 readsBasic Windows AV BypassMalwareAdd a thoughtful commentNo comments yetBe the first to start the conversation.