How to Create Trojans Using Powershell

648,676
0
Published 2021-09-16
βœ… Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! bit.ly/3AfQMpu
---------------------------------------------------------------
This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
---------------------------------------------------------------
🧠 My hacking courses πŸ‘‡
zsecurity.org/courses/
---------------------------------------------------------------
zSecurity Company - zsecurity.com/
Community - zsecurity.org/
Facebook - www.facebook.com/ZSecurity-1453250781458287/
Twitter - twitter.com/_zSecurity_
Instagram - www.instagram.com/zsecurity_org/
Linkedin - www.linkedin.com/company/zsecurity-org/
TikTok - www.tiktok.com/@zsecurity_org
---------------------------------------------------------------
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
---------------------------------------------------------------
This video was sponsored by DataCa

All Comments (21)
  • @mannyislam1
    I have a master's degree in Cyber Security and I can attest that your content is better than accredited universities.
  • @wtfdoiputhere
    lesson learned, always go to properties to check files extensions and never click links or any media from ppl you don't know ty so so much Zaid always making original and interesting videos
  • @nimira43
    The best teacher / instructor ever. I'm enrolled on all your courses and your YouTube video tutorials are fantastic. Another of my favourite instructors on Udemy is Laz Diaz; he rates you very highly, saying you're a genius. Thanks for all that you do. Massive Respect
  • @anuragrsimha
    Videos by Zaid Al Quereishi sir is a gem in their own form. Flabbergastingly, the course that I had completed is entirely different from what is in the scheduled syllabus prepared by the engineering university where I am pursuing a bachelor's degree.
  • @whathuh6965
    Mind Blown... This information is dangerous to promulgate among the internet. Imagine the many miscreant teens viewing your channel having aspirations to show off their hacking skills to their friends desiring they accept him as cool, or an angered troll online harboring malice towards a group/community that banned him due to his contentious interactions with various members. The possibilities and reasons are almost unlimited. This power shouldn't be so openly accessible to common individuals who could harness it with intent to cause catastrophic outcomes against undeserving individuals. Although I applaud your teaching abilities, you cannot deny the fact that you're indirectly positioning yourself as resourceful caveat between a supplier and manufacturer to immoral individuals seeking methods of engaging their desire to yield destructive and abusive power amid the internet. I suggest that in conjunction with teaching the public how to create malicious files, you should also inform them on the methods used to prevent malicious files from having access to their systems. Thereby, we even out the playing field. Otherwise, I enjoy your content. It's very informative.
  • @michaelodor6788
    There is no video I don't learn from you.. you are simply the best
  • @ldandco
    This is the main reason why on Windows I always set the file explorer to view the extensions for all files. This way I know if what I am executing is a exe file or an actual file.
  • @wilwad
    It’s these basic tricks that get users owned. Ordinary users just double click files and don’t know not to click random EXEs even with show extension turned on
  • @128bytes8
    that is the most barebones POC of a botnet ever. Very cool. Like the reverse shell code. Keep up the great work.
  • @DariNewsTv
    youre my fav youtuber rn yove teached me alot , i wish i had money to buy your courses
  • @shellbng
    one of the best teacher zaid sirπŸ’―πŸ’―πŸ’―πŸ’―
  • @MrRobot222
    Great video, but 4 points. 1. Any decent email provider will block this if you try to email it to them. So what delivery do you use? 2. Most people will have file extensions on and see it's an exe file and never open it. 3. any anti-virus will then block it, including windows defender. So this is pretty much useless unless your target is really, really, really stupid and has gone out of their way to make themselves vulnerable! 4. as you're hosting the files, forensic analysis will link it back to you. πŸ˜‚ Still, giving the video a like for the PowerShell info, but this is a terrible way to do it.
  • @lumilapio
    Very informative, you earned a subscriber
  • @jvintsol2
    Everybody knows not to double click an .exe file. I never use virus software. All you have to do is be aware of fake sites or files that have the wrong extensions.
  • @shahiduae100
    Dear Zaid No Doubt you are the best and first on Udemy I had already purchased and learned a lot from your series of Ethical hacker I would like to ask you if you could suggest it make video on parental care spyware Which is useful... God bless you
  • @user-cl1mr8ox9k
    Keep up the good solid work! I enjoy your content because it answers the questions that I have. Great job!