Skip to main content

Make Trojan Fully Undetectable (FUD) using Xenocode

Make Trojan Fully Undetectable (FUD) using Xenocode

A few weeks before, we had posted on how you can make your trojan using LostDoor. But the problem with the so formed trojan is it being detected by almost all AV softwares. We know that after learning to make your own trojan, the next thing you must've exhausted your bandwidth searching for is: "How to make a Trojan undetectable?" Well here is the answer.


First of all you'll have to download Xenocode (Never heard of it? We can't help it google it)

Xenocode is a set of application virtualization and portable application creation technologies developed by Code Systems Corporation.
Applications are packed into single executable files that can be executed instantly on any Windows desktop (so called "portable apps"). The technology therefore emulates only the operation system features that are necessary for the application to run. Applications can be deployed using existing infrastructure, software deployment tools, the web or USB keys. The virtualized application runs independently from other software that is installed on the host PC so there are no conflicts between different versions or DLL files.

Well, reading the above introduction must've got you acquainted you with xenocode application. You might be wondering, how this application will help you in making your Trojan undetectable.

Xenocode creates a virtual operating system for processing the files you have virtualized and hence it completely overwrites your code. As you may know, AV softwares use virus signatures to identify viruses. There are ways in which you can make a trojan undetectable by modifying the Hex code, but it is very tedious. Using xenocode alleviates the pain to a negligible level. The only pain you will have is to grab a full version of the application. Keep in mind that trial version xenocode does not create virtual applications. When you will click on the build button, it will prompt you to purchase license. We hope you understand what we mean to say implicitly.

After you download xenocode, give your trojan as the input. Now click on the build button and then specify the location where the output file must be saved. The so formed file is your undetecable Trojan. You can try scanning it with your local AV. Or if you wanna see how far you've gone, upload the file on http://scanner.novirusthanks.org/. It will provide you results after scannig your file with 20 different AV. Our score for this test was 0 outa 20. No AV detected it and the file still works fine.

Full Version Xenocode download link :- http://bit.ly/djy2ol

Video demonstration - http://techkranti.blogspot.com/p/video-tutorials.html

source : http://www.techkranti.com/

Comments

Popular posts from this blog

ESP32-C6 Wi-Fi Logger with Browser GPS + Heat Map Dashboard

This project is an ESP-IDF firmware for the Seeed Studio XIAO ESP32-C6 that turns the board into a self-hosted, secure Wi-Fi scanning logger. It creates its own access point, serves a responsive HTTPS web UI, logs nearby Wi-Fi access points, optionally tags rows with GPS coordinates (provided by the client browser), and exposes battery status from the on-board LiPo input. The end result is a pocket Wi-Fi “survey” tool: scan, track, export logs as CSV, and generate a heat map view to visualize RSSI vs location. Project overview and feature set: :contentReference[oaicite:1]{index=1} What it does AP + Station mode so the device can serve the dashboard while scanning nearby Wi-Fi networks. HTTPS web interface using a bundled certificate/key for local secure access. Single scan and continuous tracking modes. CSV export for analysis and archiving. Persistent logging to SPIFFS at /spiffs/logs.csv . Battery monitoring via ADC with voltage/percentage/status sh...

סלקום ממש לא כדאי לקנות מאצלכם מודים

סלקום באמת מבאס לגלוש אתכם !! בשעה טובה ומצלחת קניתי מודם סלולארי על מנת שאוכל לגלוש באינטרנט בעזרתו. בעמדת המכירה הציעו לי את מסלול תשלום מראש הידוע כtalkman, מסלול זה התאים לצרכי כך שאוכל לדעת מראש כמה אשלם ובחרתי לבצע את העיסקה. כאשר התחלתי לגלוש לשרתים המספקים תוכן כגון rapidshare , megaupload , zshare ועוד גיליתי כי כתובת הIP ממנה אני גולש חסומה, או עברה את כמות השימוש המותרת אולם זה קורה לפני שאני ביצעתי שימוש כלשהוא. ניסיתי להשתמש בכתובות אחרות באמצעות קבלת כתובת IP אחרת (הוצאה והכנסה של המכשיר נותנת כתובת חדשה), אולם בכל ניסיון הכתובות היו חסומות, כלומר לא יכלתי להשתמש כלל בשירות. נתון זה שהכתבות כבר בשימוש ומי שמתמש בכתובת דינאמיות חסום לא נאמר לי ולא הועלה בעת המכירה. מה שקורה שבכל אתר שאני רוצה להשתמש בו אני חסום ולא יכול להשתמש. דברתי עם מספר חברים שיש להם מודמים כאלה כבר זמן רב , כששאלתי איך לפתור : אמרו כי הבעייה נפתרה לנו ע"י שינוי בתוך המודם ל: ABN = intereal ו זה בשפה המקצועית אומר " IP קבוע" שמחתי ל פתרון ו נגשתי ל סלקום אחרי 30 דקות המתנה...

USB Hidden Copier

This sneaky little program will copy any USB drive content to your hard drive without detection of the USB owner. 1. It is totally invisible and masked enough in order not to be detected easily. 2. It will copy a maximum of 8GB that is enough space and information will not fit all hard drive space if you can not monitor it for a long time. 3. Content is saved in a folder named as the copied Usb Drive name so you can find easily who is the owner of usb copied. 4. It starts at startup of computer. 5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lasted content of that USB. 6. With it’s Control Panel you can easily manage it. 7. Content copied is saved by default in: “C:\ WINDOWS \sysbackup\” 8. The copier program is called “systemidle. exe ” in order to mask it. 9. In order not to copy you own USB Drive you can create a file named “friendflag.winxp” and put it directly on your usb (this fil...