What Shellter is…NOT!

I have seen crazy things being said online about this project. People talking about it without having any clue about what Shellter really is (doing).
The funniest thing about it, is when people actually blame the tool itself while they totally use it in the wrong way; feeding to the tool whatever might come to their head. NO KIDDING!

What Shellter is NOT:
i) packer
ii) crypter
iii) executable obfuscator
iv) whatever you think it is

Continue reading What Shellter is…NOT!

Shellter V [5.2] -Upcoming-

In the upcoming version of Shellter, most of the updates are mostly related to extra input validations, so not really visible from the user’s point of view.
However, the upcoming version will directly support domain names for the LHOST parameter of the reverse connection payloads.
So in case you really needed to use a domain name, you won’t have anymore to generate the shellcode from metasploit.
Unless of course you are using a payload not integrated in Shellter.
This is basically the most requested feature by the community, and hopefully  will be available quite soon.

Cheers,
kyREcon

London Stack Smashers

Shellter will be presented in the upcoming event of london stack smashers IT security group.

If you are planning to come over,  then bring some interesting questions and/or suggestions. I will happily consider any of those.

However, if you are planning to come over to tell me that what I do makes me a bad person; I would suggest that you skip my presentation, so that the rest of the people can enjoy it.

See you there,
kyREcon

AV Evasion Artware