Full Disk Encryption with VeraCrypt

What’s going on guys? In this post we will be checking out VeraCrypt, a cryptography tool that provides full-disk encryption. This is also a follow up post to our previous one, in which I did an encrypted dual-boot for Slackware 14.2 and Windows 10. Although you can use this tutorial by itself, for all purposes […]

Python Socket thru Proxy using SocksiPy

My friend! This time we will be adding an extra dose of anonymity and privacy to our Python shell, by providing support for proxies. Socks4, Socks5 or HTTP; it’s your choice — got ’em all. The AES encryption (seen previously here) is undoubtedly the strongest factor in this equation, because without it, the proxy server […]

Python Keylogger, Screenshots & Threads

Today we’re going to be implementing keylogging and screenshot capture with threading; some of the core aspects attributed to Python programming, which we just began to scratch. Undoubtedly one of the most logical and intuitive languages in my opinion, it also has a wide range of modules for mostly anything you could think of… chances […]

Python Backdoor – Persistence

Hey guys! This time we will implement a persistence feature for Windows operating system, but more on that later… as per the last post, I felt it was somewhat incomplete. So we will be starting off in simple fashion just to get back on track — it’s been a while — by making a privilege […]

Python Backdoor – Dynamic DNS

Hello guys! Today I am going to be demonstrating how to use a free dynamic DNS solution for our Python backdoor. Reasons to use such a service vary, like keeping a hostname reachable if you have a dynamic IP address, adding an extra layer of stealthiness to our current shell, or simply to stare at […]

Python Backdoor – Multiple Clients

What’s good? This time we’re building up on our code to support multiple clients, allowing our server to choose at any given time a client to interact with. No doubt this was the next logical step in the series, with still a few heavy hitters out there — persistence, logging, etc. Let’s get busy on […]

Python Backdoor – Privilege Escalation

Howdy! Today we’re gonna be using a classic method to escalate privileges on a fully patched Windows box. Of course, we’ll be using no other than the Python server & shell for the whole process. The reason for demonstrating this sole method is simple: privilege escalation methods/exploits vary from time to time and although some […]

Python Backdoor – File Transfer

Hey guys! What’s going on? Once again for this tutorial we will be picking up right where we left off… last time we got the encryption going on, so that all traffic between server/client is encrypted. Now that’s pretty good, but it’s time we start to enhance functionality of this shell and add new features […]

Python Backdoor – AES Encrypted Traffic

What’s up! Today, we’re gonna be picking up where we left off last time in “Programming a Custom Backdoor in Python“, so I hope you have read that before reading this or you will be pretty lost. LOL In a nutshell, we programmed a ~10 line of code reverse shell using Python’s socket and subprocess […]