by The Ethical Hacking Guru | Jul 28, 2021 | Redteam
Penetration testing is one of the most emerging and promising fields in the IT sector. Penetration testers are ethical hackers. These “good” hackers are usually hired by system software owners or web-based application companies. The pen testers check the vulnerability...
by The Ethical Hacking Guru | Jul 28, 2021 | Exploit Development, Redteam
In this tutorial, you will learn how to write a reverse shell in Nim to bypass antivirus detection. What Is Nim? Nim is a scripting language similar to Python in syntax, but close to Golang in that it requires statically typed variables and it compiles its programs....
by The Ethical Hacking Guru | Jul 5, 2021 | Vulnhub
This is a walkthrough for the VulnCMS:1 vulnhub machine. If you are looking for OSCP-like vulnhub boxes to practice with then look no further. Really if you want to prepare for the OSCP then you should consider subscribing to the Ethical Hacking Guru Academy. Want to...
by The Ethical Hacking Guru | Mar 5, 2021 | C#, ConfuserEx, Redteam
In this tutorial, I cover how to use ConfuserEx and neo-ConfuserEx to bypass antivirus. It’s worth mentioning that ConfuserEx only obfuscates .NET assemblies (compiled C# programs). I will use ConfuserEx to obfuscate a compiled version of the SafetyKatz project....
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go can be used by ethical hackers to run shellcode generated by Metasploit. That means you can use msfvenom to create shellcode that can be used by a go program to execute it. For this tutorial, I am using this project go-shellcode by brimstone on Github. First make...
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go is a popular tool for offensive programming these days. The antivirus vendors are still catching up to it since it is still a niche tool for ethical hacking purposes. In this tutorial you will learn how to write a Go program to open a new Notepad process. You will...