-
๐ Hi, Iโm @sbinsaleem
-
๐ I provide consultancy and training in the field of cyber security and software engineering. I am interested in development and testing of applications, devops, security assurance and in the field of information security as a consultant, trainer or volunteer contributor.
-
๐ฑ I constantly upgrade my knowledge by reading, conducting research and by taking part in workshops and trainings.
-
๐๏ธ Iโm looking to collaborate on any open and closed source projects as a devops engineer, application tester and penetration tester.
-
๐๏ธ I can also help companies in defining information security / cyber security policies, conducting security audits, implementing information security management systems and compliance to security standards such as ISO 27001, Nist Cyber Security framework and adopting frameworks like Mitre Att&CK and GDPR data security compliance.
-
๐ซ You can join my community of cyber security professionals working in Pakistan through Slack.
-
๐ซ Personally, I am reachable through LinkedIn and through Email.
sbinsaleem / anti-virus-evading-payloads Goto Github PK
View Code? Open in Web Editor NEWThis project forked from rosesecurity/anti-virus-evading-payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!