A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
backdoor
powershell
persistence
malware
phishing
hacking
smile
scam
spoofing
pentest
kali-linux
avs
hacking-tool
anti-forensics
windows-hacking
execution-policy-bypass
social-engineering
uac-bypass
kill-antivirus
runas
dr0p1t
-
Updated
Nov 3, 2018 - Python
I've already heard opinions like: "I can not use this on the enterpise." or "This other sudo is just a few lines RunAs script that I can audit myself." (Sure, but building a feature-rich
sudotakes far more lines than that.) and the next one probably will be: "I won't run as administrator something from a nobody on the internet."This is a trust problem. And I cannot create trust by myself.