You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 6, 2023. It is now read-only.
You can't depend all your work on an open source project.
You can see the source code and use it,why can't the antivirus providers do the same thing?
Thus,the best way is writing your own trojan loader template and dynamically change the variable in your code,also you can use the junk code generator in phantom-evasion (It is located in modules/payloads/auxiliar/useful.py),besides, you need to use direct syscall to evade AV's hook.
To sum up,you have to extract the genius ideas from phantom-evasion into your own code,not just complain about this tool is out-dated.
By the way,in my real test,i can bypass kaspersky,windefender,bitdefender...... with my own code and phantom's junk code generator.
However,i wont publish my code,because it will be useless when it is open-sourced.
Do your code and be a true hacker💪💪💪.
Hope you guys have a happy coding day💪💪💪.
Sincerely,W00dy
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
it is still being detected by windows 11
The text was updated successfully, but these errors were encountered: