Tag Archives: AV evasion

An important tip for Shellter usage

Hi all,

I have been watching this ‘bad habit’ that I am  going to discuss about, happening very often so it’s time to talk about it.

I have noticed that people tend to use Shellter with the same executables, even when this is not required as I explain later on.

Someone uploads a demo video infecting ‘putty.exe’,  then everyone uses that.
Next day someone uploads a video infecting the setup program of ‘Winrar’ and then everyone uses that.
It’s one thing using the same executables for creating videos for educational and demonstration purposes and another using those all the time on VirusTotal and other online multi-AV scanners.

I hate to ruin this for you, but by always using the same executables with Shellter,  AV vendors create better heuristics for those specific legitimate executables that you infect.

This is not really effective against Shellter itself but in some cases might fit the purpose, and make things worse for yourself when you really need to convince someone to execute a specific ‘legitimate’ application that you have infected.

Continue reading An important tip for Shellter usage

Merry Xmas And Happy New Year!

Howdy,

Another year is about to end, so let’s hope that the new year will be a better one.

I would like to thank  from the bottom of my heart everyone that supported Shellter for another year, and wish to everybody merry Christmas and happy new year.

Last year, I hoped that 2016 would have been the year of Shellter Pro. This deadline was slightly missed, but for many good reasons.
Once the paperwork is done, we will launch a short preorder period and then the official release will follow.

Oh!…and before I forget…

This Christmas, no shellcode should be without Shellter. If you are one of the many people that find this tool useful, then please consider donating in order to support this project.

binary_xmas_tree

Merry Xmas and Happy New Year Everybody!
kyREcon