Information Security
exploit antivirus msfvenom
Updated Wed, 27 Jul 2022 15:04:53 GMT

Antivirus evasion for reverse tcp


I'm trying to do reverse tcp in an exe payload. To do antivirus evasion, I've tried to use Veil evasion, The fat rat, and also Phantom evasion, but even if the exe wasn't deleted by antivirus (I use Avast in Windows 10), the connection doesn't start. The connection starts only if the antivirus is stopped, even if the exe isn't detected as a malicious file.

Does anyone know some methods to make a reverse tcp payload with antivirus evasion?




Solution

The ideal way is to write a custom payload with custom behavior, you will find this Link very useful

but you can try other tools like:

  1. Shell7er
  2. PoshC2
  3. Hack The World:

for this purpose.