Basic Windows AV Bypass - Part 5 - Embed and Execute the Shellcode
Now we can finally start coding our trojan.
The malware we are going to use for testing is a reverse TCP shell from Metasploit.
Before coding the shellcode loader, let's see if AVs can detect the reverse shell executable.
To generate the reverse TCP ...
janestebans.hashnode.dev6 min read