• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Phyton Phantom Evasion

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,455
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
av-evasion.jpg


Phantom Evasion - Python AV Evasion Tool Capable To Generate FUD Executable Even With The Most Common 32 Bit Metasploit Payload (Exe/Elf/Dmg/Apk)


Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use of modules focused on polymorphic code and antivirus sandbox detection techniques. Since version 1.0 Phantom-Evasion also include a post-exploitation section dedicated to persistence and auxiliary modules.


The following OSs officialy support automatic setup:

  •     Kali Linux Rolling 2018.1+ (64 bit)
  •     Parrot Security (64 bit)

The following OSs are likely able to run Phantom Evasion through manual setup:

  •     Arch Linux (64 bit)
  •     BlackArch Linux (64 bit)
  •     Elementary (64 bit)
  •     Linux Mint (64 bit)
  •     Ubuntu 15.10+ (64 bit)
  •     Windows 7/8/10 (64 bit)

 
To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top