Simple demonstration of a Telegram (mobile) based C2 communication on a simulated compromised Windows 11 machine.
Pretty nice to be able to monitor and control a remote Windows 11 'victim' all through a mobile application!
References used:
https://gemini.google.com/app
Windows Domain Active Directory Playlist:
https://youtube.com/playlist?list=PL0UJtYdHHM46sIZbkieIe6BhKzfu4QOI9&si=NTZ3M9y19z0Pp4PC
Free Udemy course:
https://www.udemy.com/course/intro-to-phishing/
buymeacoffee (or beer)
buymeacoffee.com/redcivet
DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.
We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.
Stay connected:
Twitter: https://twitter.com/redcivet
Udemy: https://www.udemy.com/user/gemini-88/
Github: https://github.com/redcivet
Discord: https://discord.com/invite/u9Qxxbamke