Data-mining a compromised host

In this blog, we are going to take a file that can be .txt .doc .exe and we inject a payload to it, later we will verify which antivirus it detects, and finally, we will be able to putĀ  this file in the victim’s machine, and we will observe what happens. what is a payload? … Continue reading Data-mining a compromised host