Phantom-Evasion icon indicating copy to clipboard operation
Phantom-Evasion copied to clipboard

Python antivirus evasion tool

Results 42 Phantom-Evasion issues
Sort by recently updated
recently updated
newest added

[>] Generating code... [>] Compiling... [>] Strip binary... [>] Sign Executable [>] Signing MUCOnunHayatHikayesininAcilariCokturBunuBilmeyenYoktur.exe with osslsigncode... Traceback (most recent call last): File "/home/kobruh/Phantom-Evasion/phantom-evasion.py", line 402, in CompleteMenu() File "/home/kobruh/Phantom-Evasion/phantom-evasion.py", line...

I run kali linux 2020.4 from a raspberry pi 4 and got this error when I tried installing. ``` :~/Phantom-Evasion$ python3 phantom-evasion.py --setup _ _ _ __ | |__ __...

While coming across a video tutorial of Phantom-Evasion, i saw Windows Powershell Modules. But when i cloned the repo, it didn't have this modules. Moreover all the payloads are getting...

it is still being detected by windows 11

[+] MODULE DESCRIPTION: Pure C reverse tcpstager compatible with metasploit and cobaltstrike beacon [>] Local process stage execution type: > Thread > APC [>] Local Memory allocation type: > Virtual_RWX...

In conf I leave just most settings as default, I don't pop a shell even with AV disabled, how I can solve? I'm testing on a Windows XP SP3 subsystem...

Stuck on these commands.. os.rename("msf_smali/smali/com/metasploit","msf_smali/smali/com/" + ModOpt["Metaspl"]) OSError: [Errno 2] No such file or directory Please Help me for sorting it out

I have poshc2 .bin files I want to obfuscate with Phantom - no docs on how to do this and its not intuitive. Any help? like this `[>] Insert shell...

Problems encountered when using Windows modules Traceback (most recent call last): File "./phantom-evasion.py", line 402, in CompleteMenu() File "./phantom-evasion.py", line 125, in CompleteMenu Phantom_lib.ModuleLauncher(module_type) File "Setup/Phantom_lib.py", line 943, in ModuleLauncher...