Be better than yesterday -
In this video, we demonstrate the usage of a publicly available Windows RAT Malware known as JSCat.
It was possible to bypass the Windows Defender detection triggered and successfully establish a callback to the JSCat remote server. The session established was also functional and OS command execution was possible without triggering any detection. In addition, a manual quick scan was also initiated.
Stay connected:
Twitter: [ Ссылка ]
Udemy: [ Ссылка ]
Facebook: [ Ссылка ]
Github: [ Ссылка ]
Discord: [ Ссылка ]
Link to JSCat Github Repository:
[ Ссылка ]
Gemini Security Awesome Hacking T-Shirts - Support the channel:
[ Ссылка ]
Ещё видео!