I have no background at hacking/security at all, but this video is very clear at explaining, i understood 99%. Very interesting. Just a tip from a fellow "not so excellent at typing guy" ... thou i am 100% sure you know this .. just a reminder ... on linux command line ... there is an autocomplete function, just type "cd h" .. hit TAB, and you have "cd hoaxshell". And thanks again for this video.
@officialexploitacademy2 жыл бұрын
Thank you for the tips and kind words! I try not to use autocomplete too much in my videos so people can see what I’m typing - just incase it’s too fast for them. Maybe it wouldn’t be that bad though and I’m just over thinking it lol. Thank you!
@Kingpaul4044 ай бұрын
@@officialexploitacademy how can I contact u bro
@christech5098 Жыл бұрын
i subscribe because it is begginner friendly and i understood not like other youtubers hope you are always this way easy and straight to the point thank you
@ReligionAndMaterialismDebunked2 ай бұрын
Indeed. Shalom.
@yhytuncer2 жыл бұрын
Exploit academy what a great KZbin channel name !great video btw
@officialexploitacademy2 жыл бұрын
Thank you!
@univmagique3197 Жыл бұрын
i'm finally able to bypass windows defender i've been trying so hard to do that Thanks a lot Man u're a live saver
@YNW_QI Жыл бұрын
Sop bro
@medblgsec Жыл бұрын
Thanks for the video, you couldn't paste on terminal because when you click and the cursor select something in the terminal it overwrite the actual copy buffer, you could disable that behavior from the terminal by disabling select to copy or just avoid to click while trying to past inside
@officialexploitacademy Жыл бұрын
Thanks for the tip! Glad you enjoyed the video
@edwardmacnab354 Жыл бұрын
@@officialexploitacademyso this commentor failed to understand you were not on terminal but on powershell . So his "TIP" isn't of much use . The big question now is , did you figure out why you could not copy/paste from notepad to powershell ? or do you think it was just a transitory glitch--maybe an sfc /scannow in terminal is in order ?
@originalbinaryhustler3876 Жыл бұрын
subbed, great content ❤
@officialexploitacademy Жыл бұрын
Thank you!
@originalbinaryhustler3876 Жыл бұрын
@@officialexploitacademy all good big man 🤝🏻
@diolenmedia Жыл бұрын
Thanks man! I was searching for a similar solution to bypass windows defender. Now that I know how to get a complete reverse shell without being detected, I'm planning on to execute the script on the my windows computer by programming a Trojan... I want to create an exact scenario where the computer gets hacked even without touching it.
@alberttamas29842 жыл бұрын
Hi! First of all: thank you for your video! A small offtopic - if you don't mind - what happened to you in the last 3 years - except having some cool tattoos? :)
@officialexploitacademy2 жыл бұрын
No problem! I disappeared because I was in the military at the time. When I got out I hadn’t thought about making any content because I was busy with other work. Fortunately now, I work remotely in cyber security so now I have more time to create content for you guys. What brought me back was the comments on my videos. I stayed logged into my channel and very rarely I’d get a comment thanking me for my video and saying it helped them. It really motivated me to continue making content! Thank you for asking - it means a lot.
@josetranscriptionist7927 Жыл бұрын
how can you stop the powershell window from flashing? is there any other way for it to be hidden or silent.
@Sam-tf1ni Жыл бұрын
Great video . Thanks for the usefull info man
@officialexploitacademy Жыл бұрын
Thanks for the kind words
@savernastemper569 Жыл бұрын
I’m unable to run AmsiTrigger.exe says no files or such directories y
@LEKIPE1 Жыл бұрын
How to obfuscate an exe file using this method ?
@anonymousbritishcolumbia2 жыл бұрын
2 things. That would be nice. #1 being able to convert that powrshell script into an exe #2 can you upgrade the shell to a meterpreter shell in some way or once in. Disable defender and upload a meterpreter payload and run it. Getting your meterpreter reverse shell. Now that would be epic. If possible please make a video doing just that. Would make for some great Content. Would be very useful.
@officialexploitacademy2 жыл бұрын
Noted - tomorrow I’m uploading more of The DVWA content for now, but I will loop back around and do some more antivirus evasion stuff
@34zY Жыл бұрын
Nobody click on PE file, however what can be interesting is making a remote PE injector, to inject this PE into a remote process, by uploading a PE remotely into the memory of the victim machine then making the injection into the a chosen process to hide our session behind a real windows process. My idea is basically making a "migrate" function from meterpreter which let you choose what local PE you choose to inject and behind which process you want to hide.
@anonymousbritishcolumbia Жыл бұрын
@@officialexploitacademy ??
@sujaldarode1649 Жыл бұрын
i've done that already , now i am lookin forward to make it presistant and add to exclusion
@harze681810 ай бұрын
i get the error check if real time protection is on. which IT IS ! i dont know what to do i tried running as admin aswell and i tried the executionpolicy unrestricted nothing works
@harze681810 ай бұрын
which its not i mean*
@akashyadav16522 жыл бұрын
sir i changed everything but it is detectable now what to do??
@officialexploitacademy2 жыл бұрын
If you followed the video exactly as I did it probably is detected. You need to apply what you’re taught in the video to make the script not detectable. Modify the payload with AMSITrigger. AMSITrigger also works with other payloads as well, not just Hoaxshell.
@1000tdiep Жыл бұрын
Good education video, your technique work well. Is it possible to inject the payload into victim PC without get access to victim Power shell?
@officialexploitacademy Жыл бұрын
Theoretically you could create an .exe payload or whatever payload you want to launch a powershell script with the payload. Just save the powershell payload into a .ps1 file and have it executed in some way
@1000tdiep Жыл бұрын
@@officialexploitacademy would be interesting to see the next video covering that. Remote injection using metaploit or something.
@gregoryweb3 Жыл бұрын
it really works Thanks man, how can I persistent connect to the victim machine by closing the powershell?
@CyberMysticOfficial Жыл бұрын
How did you download the AMSI exe file??!
@akashyadav16522 жыл бұрын
thankuu soooo muchhhh💕💕
@officialexploitacademy2 жыл бұрын
Sure thing! Thanks for watching!
@alirezahhh811 ай бұрын
It worked, thank you very much, it was great
@edwardmacnab354 Жыл бұрын
Do you know what an edit is ? will not copy paste --duh ! Figure that out and it's a whole new post. I usually use Crl+c then Ctrl+v to do copy/paste . Perhaps that will solve the problem ?
@officialexploitacademy Жыл бұрын
Ctrl C and Ctrl V wasn’t working. And working with powershell it’s typically not Ctrl c but shift Ctrl c and shift Ctrl V. But thanks for the comment
@timecop1983Two5 ай бұрын
amazing this guy is a pro hacker
@ReligionAndMaterialismDebunked2 ай бұрын
Very informative! Very beginner-friendly! Shalom. :3
@wolf-2003 Жыл бұрын
Deliver the payload using social engineering technique
@mickbanana8999 Жыл бұрын
awesome vid
@officialexploitacademy Жыл бұрын
Thank you!
@ujjvalw26842 жыл бұрын
I think KZbin shadows bans this content
@officialexploitacademy2 жыл бұрын
I wouldn’t be surprised personally. It’s pretty annoying as there is educational value in it.
@officialexploitacademy2 жыл бұрын
@@chrisbitus1328 we will see - judging by analytics it seems the channel is slowly gaining traction. I’m hoping to keep the momentum going.
First is a Educational Video, Microsoft needs to pay attention to different issues that Windows have, also this could improve the AntiVirus industry, if you are scare this will fall in the wrong hands, trusted me those people have better tools