How to Create Trojans Using Powershell

  Рет қаралды 635,191

zSecurity

zSecurity

2 жыл бұрын

✅ Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! bit.ly/3AfQMpu
---------------------------------------------------------------
This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
---------------------------------------------------------------
🧠 My hacking courses 👇
zsecurity.org/courses/
---------------------------------------------------------------
zSecurity Company - zsecurity.com/
Community - zsecurity.org/
Facebook - / zsecurity-145325078145...
Twitter - / _zsecurity_
Instagram - / zsecurity_org
Linkedin - / zsecurity-org
TikTok - / zsecurity_org
---------------------------------------------------------------
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
---------------------------------------------------------------
This video was sponsored by DataCamp

Пікірлер: 804
@mannyislam1
@mannyislam1 Жыл бұрын
I have a master's degree in Cyber Security and I can attest that your content is better than accredited universities.
@zSecurity
@zSecurity Жыл бұрын
Glad to see that you like it 👊
@ogvgamer3378
@ogvgamer3378 Жыл бұрын
bro know i am 11th class i will also do masters in cyber security
@metinaktor5383
@metinaktor5383 Жыл бұрын
Give your discord for the jobs. Thx
@royalsrivastava2079
@royalsrivastava2079 Жыл бұрын
so should i go for masters in cyber security after my bachelors in Ai&ML ? i will appreciate your opinion!
@mannyislam1
@mannyislam1 Жыл бұрын
@@royalsrivastava2079 artificial intelligence and machine learning falls under data science. Cyber Security is very different from Data Science. If you do go for Masters, go something related to data science. If you want to demonstrate some cyber security knowledge, certifications will help you better than college.
@unknownlordd
@unknownlordd 2 жыл бұрын
lesson learned, always go to properties to check files extensions and never click links or any media from ppl you don't know ty so so much Zaid always making original and interesting videos
@luan_dragonpro9669
@luan_dragonpro9669 Жыл бұрын
or just enable file extencions
@anuragrsimha
@anuragrsimha 2 жыл бұрын
Videos by Zaid Al Quereishi sir is a gem in their own form. Flabbergastingly, the course that I had completed is entirely different from what is in the scheduled syllabus prepared by the engineering university where I am pursuing a bachelor's degree.
@donhousam
@donhousam 2 жыл бұрын
does this payload passing Facebook security bot +WhatsApp?
@anuragrsimha
@anuragrsimha 2 жыл бұрын
@@donhousam Could you consider elaborating? Your question seems to be quite unclear, I'm afraid.
@nimira43
@nimira43 2 жыл бұрын
The best teacher / instructor ever. I'm enrolled on all your courses and your KZfaq video tutorials are fantastic. Another of my favourite instructors on Udemy is Laz Diaz; he rates you very highly, saying you're a genius. Thanks for all that you do. Massive Respect
@128bytes8
@128bytes8 Жыл бұрын
that is the most barebones POC of a botnet ever. Very cool. Like the reverse shell code. Keep up the great work.
@ldandco
@ldandco 2 жыл бұрын
This is the main reason why on Windows I always set the file explorer to view the extensions for all files. This way I know if what I am executing is a exe file or an actual file.
@zSecurity
@zSecurity 2 жыл бұрын
There are ways to spoof the file extension too, already covered in our courses or lookup RTL override.
@MrRobot222
@MrRobot222 2 жыл бұрын
@@zSecurity Even Widnows Defender would still block it. Plus you can't email this to someone as any email provider would block it, so how do you deliver it?
@oo7posam581
@oo7posam581 2 жыл бұрын
@@MrRobot222 Recently the security has been increased... So manual is only option
@yuliyy__
@yuliyy__ 2 жыл бұрын
@@MrRobot222 Torrents
@MrRobot222
@MrRobot222 2 жыл бұрын
@ZcyberTech Antivirus would still block it
@wilwad
@wilwad 2 жыл бұрын
It’s these basic tricks that get users owned. Ordinary users just double click files and don’t know not to click random EXEs even with show extension turned on
@user-cl1mr8ox9k
@user-cl1mr8ox9k 7 ай бұрын
Keep up the good solid work! I enjoy your content because it answers the questions that I have. Great job!
@SagarNunia-md4wn
@SagarNunia-md4wn 3 ай бұрын
how I am gain the interface as shown in this video???
@DariNewsTv
@DariNewsTv 4 ай бұрын
youre my fav youtuber rn yove teached me alot , i wish i had money to buy your courses
@shahiduae100
@shahiduae100 2 жыл бұрын
Dear Zaid No Doubt you are the best and first on Udemy I had already purchased and learned a lot from your series of Ethical hacker I would like to ask you if you could suggest it make video on parental care spyware Which is useful... God bless you
@decoder6878
@decoder6878 2 жыл бұрын
Nice video and awesome courses. I learnt a lot from your courses.
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@jeanemeryenoga9949
@jeanemeryenoga9949 11 ай бұрын
This is your best tuturial for ever. Thanks à lot master. 👏👏👏
@michaelodor6788
@michaelodor6788 2 жыл бұрын
There is no video I don't learn from you.. you are simply the best
@mr_crapto
@mr_crapto 2 жыл бұрын
yep i agree with you buddy
@Yoghaaa
@Yoghaaa 2 жыл бұрын
Couldn't agree more
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html :
@Patrickjphilippe
@Patrickjphilippe 2 жыл бұрын
So can somebody explain to me about what this guy does because I’m interested in this so called security defense trade but would this be under coding or just hacking
@tumon1237
@tumon1237 2 жыл бұрын
Hello Zaid, I am your big fan.I am eagerly waiting for a cyber security course from you. I know you are truly knowledgeable at this sector...
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@kbto
@kbto 2 жыл бұрын
Very informative, you earned a subscriber
@grey1185
@grey1185 2 жыл бұрын
I took the courses Zaid offers. They are really great and its wonderful to see you making great content
@MrRobot222
@MrRobot222 2 жыл бұрын
Great video, but 4 points. 1. Any decent email provider will block this if you try to email it to them. So what delivery do you use? 2. Most people will have file extensions on and see it's an exe file and never open it. 3. any anti-virus will then block it, including windows defender. So this is pretty much useless unless your target is really, really, really stupid and has gone out of their way to make themselves vulnerable! 4. as you're hosting the files, forensic analysis will link it back to you. 😂 Still, giving the video a like for the PowerShell info, but this is a terrible way to do it.
@zSecurity
@zSecurity 2 жыл бұрын
I did say its a quick and dirty way of doing it. All points you mentioned are valid but can be addressed and bypassed by this very Trojan, the video will turn into a full course if I do that though
@shidypix8726
@shidypix8726 2 жыл бұрын
So how would you go about it ??
@MrRobot222
@MrRobot222 2 жыл бұрын
@@zSecurity Please don't get me wrong. I've done 2 of your courses and really enjoy your content. As I said, the powershell side is useful. Just creating a FUD backdoor these days is getting harder and harder. Veil, FatRat, Empire, Shikata ga nai are all becoming detectable by both email and AV. It can be done, just takes so much more effort these days! 😊
@cyyborgg
@cyyborgg 2 жыл бұрын
@@MrRobot222 Did you successfully make any undetectable backdoors yet? I tried myself but I failed miserably 😂😂
@MrRobot222
@MrRobot222 2 жыл бұрын
@@cyyborgg I've made several backdoors through various obfuscation techniques, but all detected, even by windows defender and the various email clients. I'm learning python with the hope of writing my own as this could be the only way forward.
@uzi5998
@uzi5998 2 жыл бұрын
I bought your Udemy courses sir, ngl your explanation is the best.
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@Technical_Insight
@Technical_Insight Жыл бұрын
Hello bro
@Technical_Insight
@Technical_Insight Жыл бұрын
Can you share the course with me please
@juniorpillay
@juniorpillay 2 жыл бұрын
Can you show us without using empire or even Metasploit because using these frameworks are other people's programs doesn't teach us much but I do appreciate all your effort
@mastaghimau
@mastaghimau 2 жыл бұрын
Very nicely explained Zaid... Thanks a lot for your sharing....
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@Malisha_Rasiru
@Malisha_Rasiru 9 ай бұрын
SSuperb Bro I have Ever Seen such a clear explanation 🤝
@robingood2493
@robingood2493 2 жыл бұрын
Of course its exe in the final or I would scary) Useful for a few type of things maybe. Not for main cases of course.
@shellbng
@shellbng 2 жыл бұрын
one of the best teacher zaid sir💯💯💯💯
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@limajrfabio
@limajrfabio 2 жыл бұрын
Great video! Thank you for share! I always say check the origin, sometimes is not what you think.
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html :
@einsteinwallah2
@einsteinwallah2 2 жыл бұрын
you should now do a video on how to prevent being victim of such attack or detect if you are already attacked and how to prevent its consequences
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@manavgora1758
@manavgora1758 Жыл бұрын
Wow that was an amazing practical, i am very impressed and i subscribed
@robinbijo
@robinbijo 2 жыл бұрын
@zSecurity this is in case of an exe file,people will know that this is not an image file rather it is an exe file,so how can we make a backdoor behind an image?? Also how do you do it for a pdf file?
@josinjojy4268
@josinjojy4268 2 жыл бұрын
Please make a video on how to create an undetectable backdoor with C /C++ or assembly language
@lingehmuhamed5718
@lingehmuhamed5718 5 ай бұрын
please what tool are you using to listen for incoming connection? the interface is awesome please help me with it if anyone has an idea of the tool.. the video is great i'm recently following some of your videos in udemy it's great keep up with the good work.
@dhavalsuthar1
@dhavalsuthar1 2 жыл бұрын
Sir !! You are great 😊
@ELLOHx3
@ELLOHx3 2 жыл бұрын
This is good stuff but the tutorial should have started from how the empire terminal (command & control server) was created. Or do you have a video for that?
@AwesomeCaden73
@AwesomeCaden73 2 жыл бұрын
What was the bat to exe file converter you used? I couldn't find the link.
@khizrshaikh9902
@khizrshaikh9902 2 жыл бұрын
Thanks for this Sir/Brother
@harshavardan9054
@harshavardan9054 2 жыл бұрын
Hey I have a doubt when the victim clicks in that image will if trigger the Security malware of the victim or it does not
@postmahtoast2736
@postmahtoast2736 2 жыл бұрын
This guys so good, I feel compromised by watching this video
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html :
@DavidParathyras
@DavidParathyras Жыл бұрын
I really like how you call the letter 'z' with its real pronunciation and not the American one
@amaanquadri2901
@amaanquadri2901 2 жыл бұрын
Zaid sir taken your 11 udemy courses love form India
@charliecrane253
@charliecrane253 2 жыл бұрын
Great video, obviously you would need to obfuscate your reverse shell so Windows defender doesn't catch on
@fl3tched
@fl3tched 2 жыл бұрын
id love to see an up to date tutorial on how to bypass av with obfuscation
@muaviyaharsalan4414
@muaviyaharsalan4414 2 жыл бұрын
@@fl3tched same, honestly I've seen a bunch of videos but not one of them works
@scp-burgerking658
@scp-burgerking658 2 жыл бұрын
There is no point in obfuscating code. Obfuscating just makes it harder to read for humans. AV’s can un-obfuscate (beautify) codes in matter of miliseconds
@muaviyaharsalan4414
@muaviyaharsalan4414 2 жыл бұрын
@@scp-burgerking658 what about encrypting?
@scp-burgerking658
@scp-burgerking658 2 жыл бұрын
@@muaviyaharsalan4414 Yep, thats what you’re looking for
@jvintsol2
@jvintsol2 2 жыл бұрын
Everybody knows not to double click an .exe file. I never use virus software. All you have to do is be aware of fake sites or files that have the wrong extensions.
@freeguy37
@freeguy37 2 жыл бұрын
Really helpful!
@q1ncite
@q1ncite 2 жыл бұрын
Zaid ты топовый чувак! Я очень рад что есть такой крутой хакер :) Но один минус я владею низким уровнем английского, но есть субтитры
@joele2857
@joele2857 2 жыл бұрын
Thank you sir!!
@MrSavindrasingh
@MrSavindrasingh 3 ай бұрын
That's why I always use "Show > File name extensions" as a default setting
@lenovothinkpad9475
@lenovothinkpad9475 2 жыл бұрын
Thank you so much AS YOU CAN SEE
@johnsam3240
@johnsam3240 2 жыл бұрын
Nice one but what about windows defender or any other antivirus detection??
@igor-kostelac
@igor-kostelac 4 ай бұрын
Where can I find this hand pointer that you use in your presentation? Thank you
@luismarrero9293
@luismarrero9293 2 жыл бұрын
great tutorial. Always didactic and a lot of learning .Thanks
@CoryResilient
@CoryResilient 2 жыл бұрын
Do you have a course to bypass defender now in 2022 using this or similar methods. And is it possible to use veil powrshell bat to exe like your old video. Do the edits to the power shell options then encrypt the string even further to bypass defender now
@d_faceedit3419
@d_faceedit3419 9 ай бұрын
i love this video but i already know this method and yeah that's great to see that because this same method i think and make a prototype of it and it work properly also implement in ms excel that download file from internet using cmd then run that file and perform the hacking after this it upload all the data to cloud really a great video for those who are learning
@jeremycheong8036
@jeremycheong8036 2 жыл бұрын
I bought your course. Can’t wait to start learning! 🤟
@zSecurity
@zSecurity 2 жыл бұрын
Hope you enjoy it!
@tojabdhei4881
@tojabdhei4881 2 жыл бұрын
Very useful bro ❤️
@blackdevil5962
@blackdevil5962 2 жыл бұрын
sir i like your intro.. very well.
@picku4486
@picku4486 2 ай бұрын
Dear Fbi, I'm here for educational purpose only!
@copyright-pw8bz
@copyright-pw8bz 5 күн бұрын
No way same
@Mindflayer86
@Mindflayer86 2 жыл бұрын
Can't... resist... THUMBNAIL!!
@jamesrushforth1026
@jamesrushforth1026 Жыл бұрын
So cool mate never seen anything like it can this be used on phone too iphone or android the newer ones???
@michaelwatson3962
@michaelwatson3962 2 жыл бұрын
Greetings to you sir i wana know if the 2nd command line content of the notepad which is in bat is placed to exe file i mean the backdoor file...my question is can exe file backdoor be used just like that...if so? pls describe briefly.................thanks regards
@GhostCrypto-tm1tl
@GhostCrypto-tm1tl 2 жыл бұрын
A detailed explanation video , thanks a lot 👍
@user-lk9ir9pt2m
@user-lk9ir9pt2m 2 ай бұрын
how do you build the connection between the code and kali?
@telo6739
@telo6739 2 жыл бұрын
Do you have a safe link for the "bat to exe converter"? Since that's such a typical name I'd guess several of those you find on google when searching that won't be safe.
@RanaMSikandar
@RanaMSikandar 2 жыл бұрын
Do you think it will pass throw windows defender. Mostly bat to exe are caught by windows defender
@kabandajamir9844
@kabandajamir9844 2 жыл бұрын
Good explanation sir
@SagarNunia-md4wn
@SagarNunia-md4wn 3 ай бұрын
what tool are you using to listen for incoming connection?... Actually I am asking that
@daveodie1575
@daveodie1575 Жыл бұрын
You are simply the best!!!
@unlucky9095
@unlucky9095 2 жыл бұрын
Amazing great job
@MacronLacrom
@MacronLacrom Жыл бұрын
So you make a bat file with those commands then you use another program to change the icon?
@0xazyz897
@0xazyz897 2 жыл бұрын
Amazing video Zaid, Thank you!
@MarkAnthonyGermanos
@MarkAnthonyGermanos 8 ай бұрын
Purely excellent.
@cryptolicious3738
@cryptolicious3738 2 жыл бұрын
better use a firewall n a/v . avg wont let apps connect unless they have an entry in the firewall...right?
@aitboss85
@aitboss85 2 жыл бұрын
If the user has enabled in the display option to view file extensions, they will notice easily it is an .exe file...
@Gareth1892000
@Gareth1892000 2 жыл бұрын
Yes, this is just a basic tutorial, and the method is used only with social engineering (where you trick other to click it). Otherwise, if you could write trojan and implement it purely in jpg/png file without exploit the user programme reader easily, the world security would be doomed.
@aitboss85
@aitboss85 2 жыл бұрын
@@Gareth1892000 what program are you using to gain control over victims?
@musshare
@musshare 2 жыл бұрын
most users arent critical
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@kastakastakasta2933
@kastakastakasta2933 2 жыл бұрын
@@Gareth1892000 kzfaq.info/get/bejne/bcyGZMKXlc_Uk40.html
@shootingpoint8427
@shootingpoint8427 2 жыл бұрын
Zaid is rocking now
@_guerrmo
@_guerrmo Жыл бұрын
hey what software do i use to access the target?
@2802mdah
@2802mdah 5 ай бұрын
Currently im doing your ethical hacking course. hope i can learn to bypass the obstacles there.
@necrqumOG
@necrqumOG Жыл бұрын
which bat to exe converter are you using? I'm asking because I need one and you havent linked yours. All I founded were infected with malware.
@beloaded3736
@beloaded3736 2 жыл бұрын
Thanks Sir Zaid. Jazakallah khair.
@akhilpandey1579
@akhilpandey1579 Жыл бұрын
Should we use port forwarding while using this attack?
@dayshag5257
@dayshag5257 Жыл бұрын
can you use metasploit instead of the program you used for the agents
@anonymous4911
@anonymous4911 Жыл бұрын
Any Video to the kali machine he uses?
@SherinSunny-rj3py
@SherinSunny-rj3py 2 жыл бұрын
Hi zaid I am one of your students who enrolled in all of your courses which are totally best for beginners as well as , you explain complex topics in simple format so a request please make a course on "Learn Ethical Hacking and C programming from scratch " as well as "Learn software Ethical Hacking " Awaiting for your response With regards
@einsteinwallah2
@einsteinwallah2 2 жыл бұрын
sherin what is the difference between "Learn Ethical Hacking" and "Learn software Ethical Hacking"?
@CyberSecurity_Analysist
@CyberSecurity_Analysist 3 ай бұрын
brother which tool are you using on the terminal??(empire ..this one, what is this??)
@elizabethandiosa4579
@elizabethandiosa4579 5 ай бұрын
Thank you. I am sure feeds can be manipulated too.
@chriscjjones8182
@chriscjjones8182 2 жыл бұрын
Why not just use the dos copy command with the b option? That way you have an actual image file not an exe and the image opens as normal but still runs the batch file as well. Very old technique now yes, but I'm asking is there a reason not to do it that way?
@SagarNunia-md4wn
@SagarNunia-md4wn 3 ай бұрын
ok, then what to do as your opinion... please tell me simply..
@Atreus21
@Atreus21 2 жыл бұрын
That's a hell of a thumbnail sir.
@noema792
@noema792 2 жыл бұрын
Does this pen testing attack also work on Max computers or just on Windows?
@BATMAN78737
@BATMAN78737 2 ай бұрын
Salam Brother are this works for iphones or androids phones thanks for reply
@memedythinker
@memedythinker 2 жыл бұрын
hello sir please make a full course on api hacking jwt hacking and owasp top 10
@hadicrecket
@hadicrecket 2 жыл бұрын
Sir your videos are very good i watch your every video and get a lot of knowledge from it Sir who are you, show us by making another video in which tell how we can find free internet and free host find for free sim Internet
@manicsurfing
@manicsurfing 2 жыл бұрын
Thanks man!
@shashank.c
@shashank.c 2 жыл бұрын
Can we trust tools like the bat to exe converter? What if the tool adds some code of its own to create a backdoor for itself as well! 😛
@dmaxgames9025
@dmaxgames9025 2 жыл бұрын
Hello Zaid, Can you make a complete training to obtain CEH10 certification?
@jeandreterblanche418
@jeandreterblanche418 2 жыл бұрын
After the code from the Trojan is on the host computer, can the computer be connected to whenever the host is online? Even after the a period of time has passed (say a month)? I also assume it only works when the host is online
@morsalinpranto5860
@morsalinpranto5860 2 жыл бұрын
Can you make a tutorial about pegasus?
@louis417asdo
@louis417asdo 2 жыл бұрын
Hi Zaid, I know you from Udemy and I’m learning your courses. I have a question of this video, even the icon looks like a png, but when you simply move the mouse on the file or right click the file, you could see it’s not a png. How could I solve this?
@zSecurity
@zSecurity 2 жыл бұрын
There is no solution for that unfortunately.
@paulspl2581
@paulspl2581 2 жыл бұрын
That guy is a big scam. All the info you can find on his channel is already online. Don't buy classes for hacking, they're almost always scams
@aafiyamemon9535
@aafiyamemon9535 2 жыл бұрын
@@zSecurity Hi Zaid from zsecurity can we perform similar applications for android also as.apk And if yes how??? Can u suggest me where similar codes or any shell command are being run in android just as powershell used in windows...? I am new to ur channel plz guide me
@nostalgiccringeallhailchel3881
@nostalgiccringeallhailchel3881 2 жыл бұрын
@@paulspl2581 how do you do it then?
@paulspl2581
@paulspl2581 2 жыл бұрын
@@nostalgiccringeallhailchel3881 do what
@obaidullah7780
@obaidullah7780 2 жыл бұрын
whats the name of listener which you have pre-installed on your system because from nc -vv -l -p 9001 cant be reached (KINDLY SOMEONE EXPLAIN KALI LINUX PART)
@krunked4949
@krunked4949 6 ай бұрын
So quick and ez!
@crystoff7037
@crystoff7037 Жыл бұрын
thats so interesting, thank you
@zSecurity
@zSecurity Жыл бұрын
You're welcome
@techwiki262
@techwiki262 2 жыл бұрын
Please make a special video for making an undetectable Trojan Using Kali. Lots of love 😊😊😊by TechWiki
@ahsansyed3752
@ahsansyed3752 2 жыл бұрын
Hello Zaid Sir I'm one of your follower following your Channel from 2020 and gaining knowledge from content like hacking Recently in Custom Kali Linux you have created a 7z file which is 2.7gb file but u have packed 12gb in it Please explain me how to do that
@praveenmalik8066
@praveenmalik8066 2 жыл бұрын
which tool you are using to get reverse connection? is it metasploit???
@zSecurity
@zSecurity 2 жыл бұрын
No, powershell-empire
@jamesmary9848
@jamesmary9848 2 жыл бұрын
thank you zaid
@manofadventre83
@manofadventre83 2 жыл бұрын
I purchased your course and cannot access your website. to download the updated kali what do i do?
Coding a trojan in Python
34:51
Cyph3r
Рет қаралды 20 М.
Hackers Are Waiting For You to Open This Image
15:18
zSecurity
Рет қаралды 175 М.
She’s Giving Birth in Class…?
00:21
Alan Chikin Chow
Рет қаралды 8 МЛН
狼来了的故事你们听过吗?#天使 #小丑 #超人不会飞
00:42
超人不会飞
Рет қаралды 61 МЛН
WHY DOES SHE HAVE A REWARD? #youtubecreatorawards
00:41
Levsob
Рет қаралды 38 МЛН
How to Make Your Own VPN & Configure it For Maximum Privacy
25:15
3 HACKING gadgets you have to TRY!!
19:34
NetworkChuck
Рет қаралды 1,4 МЛН
How to make your own Hacking Operating System
1:01:57
zSecurity
Рет қаралды 289 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 382 М.
Infiltrating Roblox’s Fake Middleman Scam
18:57
No Text To Speech
Рет қаралды 388 М.
I learned to code from scratch in 1 year. Here's how.
41:55
Thomas Frank
Рет қаралды 330 М.
How hackers hack with an image Trojan?!
7:39
Loi Liang Yang
Рет қаралды 115 М.
Fileless Ransomware: Powershell Netwalker
7:22
The PC Security Channel
Рет қаралды 63 М.
How to Jailbreak ChatGPT (GPT4) & Use it for Hacking
18:51
zSecurity
Рет қаралды 423 М.
She’s Giving Birth in Class…?
00:21
Alan Chikin Chow
Рет қаралды 8 МЛН