t3l3machus

t3l3machus

Creating videos about offensive security tools, CTFs, programming and Information Technology related tutorials.

Reverse Shells with Ngrok

Reverse Shells with Ngrok

Пікірлер

  • @garrinormanivannacov370
    @garrinormanivannacov37011 күн бұрын

    awesome it's work!

  • @perfectlyinsane6379
    @perfectlyinsane637919 күн бұрын

    Greek ?

  • @hpmh7568
    @hpmh7568Ай бұрын

    how do i put hoaxshell payloads into : . ps1 file and just fake to. png or some image file extension, and when they click on it executed and just hide or close the powershell right away

  • @greyburns6170
    @greyburns61702 ай бұрын

    But is anyone else starting to feel like cyber security has pretty much won by now? Idk I guess rly bad actors doing physical penetration attacks is still happening. But the days of hacking your friends laptop to Rick roll him are pretty much dead. Thanks behavior based protection. I'm drunk

  • @greyburns6170
    @greyburns61702 ай бұрын

    You're my Arnold Schwarzenegger bro

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo21102 ай бұрын

    Hi ! Do I need to use obf payload in order to use the upload tool ? I'm getting denied access response when I'm trying to copy simple texts to my desktop ?

  • @HaxorTechTones
    @HaxorTechTones2 ай бұрын

    Make sure to add the file name to the path you want the file to be uploaded, not only the dir.

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo21102 ай бұрын

    @@HaxorTechTones It seems better but still not working, when I keep my hard disk name it says : the generic path isn't resolved when I just type the path from /users, as you did, it says : non-conforming character (translate from french, hope you will get it :/)

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo21102 ай бұрын

    Ok just got it !!! The problem was that I kept writing the full path, like I was in C:/Users/TheGuyIAm and I kept writing C:/Users/TheGuyIAm/Desktop/TheFileIWant when I should have written /source_path \desktop\TheFileIWant

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo21102 ай бұрын

    @@HaxorTechTones And thx ! You're the best !

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo21102 ай бұрын

    One last question, I tried connecting to an FTP server using Villain but kept blocking at the connection step, is it normal or ?

  • @andreadistasi8842
    @andreadistasi88422 ай бұрын

    Great work! I'd like to get to know you and chat a bit sometimes.

  • @igornemorssa2936
    @igornemorssa29363 ай бұрын

    Thx for your project . It is very fantastic

  • @hellresistor
    @hellresistor3 ай бұрын

    nice job @t3l3machus ! For some reason upload wont work here, maybe because i am using ngrok.

  • @cadenfore8298
    @cadenfore82984 ай бұрын

    Thanks for the walkthrough, new to reversing challenges and this is a good starter

  • @ooxoox176
    @ooxoox1764 ай бұрын

    Error parasiong LHOST, Invalid Ip or interface am trying to use ngrok ):

  • @madathalanithinreddy4594
    @madathalanithinreddy45944 ай бұрын

    Hey can you help me with one question

  • @andreasclaudius9076
    @andreasclaudius90764 ай бұрын

    obfuscate don t work anymore, can you say me tools for this?

  • @techteam0578
    @techteam05784 ай бұрын

    Sir how to create toxssin certificate and private key.

  • @Pesarkhande66
    @Pesarkhande664 ай бұрын

    Hi.bro.please give a DigiSpark complete program to open android pin.so thanks.

  • @IvanLarsen-cr4pq
    @IvanLarsen-cr4pq4 ай бұрын

    товарищ

  • @RaGhav363
    @RaGhav3635 ай бұрын

    Can you make one more vedio on payload obfuscatinon both for VBA and Powershell again ?

  • @codedspirit
    @codedspirit5 ай бұрын

    And in rust... I love it man ♂️

  • @nsns7993
    @nsns79935 ай бұрын

    Nice!

  • @greyburns6170
    @greyburns61705 ай бұрын

    Hahaha my computer agrees with you about AMSItrigger.. it refuses to let me download it even with defender off. My comps telling me im stupid

  • @greyburns6170
    @greyburns61705 ай бұрын

    Everytime I type in exactly what you typed it says "Required argument PAYLOAD not supplied" can anyone help me with this

  • @HaxorTechTones
    @HaxorTechTones5 ай бұрын

    The syntax has changed in the latest version. Type "help payload" for details or check out my channel for the most recent introduction.

  • @alimuhamed6084
    @alimuhamed60845 ай бұрын

    Sir, why can't I upload files?

  • @novianindy887
    @novianindy8875 ай бұрын

    So that we have payload in ps1 script , what are ways to execute .ps1 script with a click? You cant expect user to right click and run the .ps1 file right😊

  • @bleuforcedz6727
    @bleuforcedz67276 ай бұрын

    Very informative video.. Thanks 🌹

  • @HamsterLover1337
    @HamsterLover13376 ай бұрын

    Good tutorial, thanks

  • @Kingdd1os
    @Kingdd1os6 ай бұрын

    Genius ❤

  • @BIZLOOK
    @BIZLOOK6 ай бұрын

    It this work over internet by ngrok or something

  • @hellresistor
    @hellresistor3 ай бұрын

    dig a little bit ;)

  • @Free.Education786
    @Free.Education7866 ай бұрын

    Please, if possible, cover these advanced topics like How to bypass Drupal CMS or other secured CMS? How to bypass HARD WAF protection that stops HTML, SQL, and XSS injection payloads? Payload single-double-triple encoding using Cyber-Chef? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc.,? How to bypass Hard WAF using SQLMAP or Burpsuite? How to find hidden vulnerable parameters and endpoints inside the .js and .jason files? How to find hidden admin pages, cPanel pages, and WHM pages ? Please cover these important topics. Thanks🎉❤

  • @novianindy887
    @novianindy8877 ай бұрын

    Is it reversible?

  • @panagiotisioannidis517
    @panagiotisioannidis5177 ай бұрын

    are you greek i am?

  • @sudityashrivastav
    @sudityashrivastav7 ай бұрын

    just looking like a wow.

  • @migueltartarea
    @migueltartarea7 ай бұрын

    Hello, do you know any viable way that the payload villain can be persistent?

  • @erfanwork7506
    @erfanwork75067 ай бұрын

    hi very good vid and fast command whats the attiny85 commands ?

  • @Pyroteq
    @Pyroteq8 ай бұрын

    I suck at coding, but you made this very easy to understand. Thank you.

  • @osvaldopereo4285
    @osvaldopereo42858 ай бұрын

    you are amazing!!! How can upload to remote file path with blank spaces? = upload /localpath/text.txt emotepath\blank space\text.txt?

  • @user-zu5kl7tk8p
    @user-zu5kl7tk8p8 ай бұрын

    thank you for sharing !!

  • @RAVEN---
    @RAVEN---9 ай бұрын

    Hey pal remember the villain tool you made? Well after the new windows defender update the tool code gets flagged I was able to bypass it tho... Now the issue is, even though there is no issue in bypassing I am still not getting a reverse connection I only get it once I turn off the defender. Can you just look into it? Pls

  • @PlayStore-rb6gk
    @PlayStore-rb6gk9 ай бұрын

    Sir plz make a video how to bypass metasploit payload

  • @berthold9582
    @berthold95829 ай бұрын

    Woooooo

  • @berthold9582
    @berthold95829 ай бұрын

    Ngrok nous facile les choses surtout pour l'achat du materiel

  • @Jamaal_Ahmed
    @Jamaal_Ahmed9 ай бұрын

    Please make a video to port forwarding 🙏

  • @thepilotsparrow
    @thepilotsparrow9 ай бұрын

    Hello! is there a way to download stuff from the victim pc? I tried everything but couldn't maybe I just suck :*)

  • @HaxorTechTones
    @HaxorTechTones9 ай бұрын

    Hi, in an automated manner, like, "download /path/to/file", not yet unfortunately, but the feature will be added in a future update :)

  • @thepilotsparrow
    @thepilotsparrow9 ай бұрын

    ​@@HaxorTechTonesYoooo! You are the best

  • @Strategic.
    @Strategic.10 ай бұрын

    Is there a better way to run it? like through an executable or something?

  • @firos5381
    @firos538110 ай бұрын

    wow nice talk. looking forward to more such conversations

  • @Jamaal_Ahmed
    @Jamaal_Ahmed10 ай бұрын

    2023 not working , becouse we give a different payload , therefore not-working .

  • @F.M671
    @F.M67110 ай бұрын

    "Sorry that was greek" oh man that made me laugh. Good stuff, love to know this tech is still old but gold.

  • @elmehdioubouhouch
    @elmehdioubouhouch10 ай бұрын

    A new subscriber for this dude here from Morocco

  • @elmehdioubouhouch
    @elmehdioubouhouch10 ай бұрын

    You are amazing man i love the project keep it up

  • @TheQA247
    @TheQA24710 ай бұрын

    This is 🔥 Can I suggest a nice-to-have: Ability to generate a report based on scope; capture screenshots & steps as well

  • @firosiam7786
    @firosiam778610 ай бұрын

    Cool mate ah if I may ask on another topic regarding a project I thought u were working on a project that helped obfuscate payloads automatically hws that coming is it still under development or is it not coming out ?

  • @HaxorTechTones
    @HaxorTechTones10 ай бұрын

    Hey, a beta version of that project exists, it's not public and will probably be merged into something bigger. It will take some time to be released.

  • @firosiam7786
    @firosiam778610 ай бұрын

    @@HaxorTechTones merged with villan I suppose that would be cool