You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This really should not be an issue but I am just posting this to let other people know...
ps1encode is really good, it does not get caught until the victim opens the file, but it gets caught because the anti virus saw it doing a Evo-Gen activity.
The text was updated successfully, but these errors were encountered:
Hey @BeingEasy when selecting your encoder, switch --ENCODE is same as -t.
The tool as of now does not support native x64 shells, but generating standard x86 payload will work on 64bit systems. If you need native architecture meterpreter for credential dumping purposes, I suggest using "migrate" command to hook into x64 process post exploit.
This really should not be an issue but I am just posting this to let other people know...
ps1encode is really good, it does not get caught until the victim opens the file, but it gets caught because the anti virus saw it doing a Evo-Gen activity.
The text was updated successfully, but these errors were encountered: