Tag Archives: post exploitation

Shellter Pro Plus v8.5 [Released]

Our latest version update of Shellter Pro Plus software series is available to download.

This release introduces targeted runtime evasion and further enhances the automation of backdooring an application, including through a hi-jackable system module.

There is also an available demo for our Enhanced Application DLL Backdooring II feature that shows its capabilities.

Enjoy,
kyREcon

Shellter Pro Plus v8.4 [Released]

Our latest version update of Shellter Pro Plus software series is available to download.

We have introduced a few updates to the imports parser of the target PE binary in order to recognise the imports mechanism of Windows built-in system modules.

This allows Shellter to recognise which system modules support the advanced features of our software and provides extra flexibility when backdooring an application through a DLL.

There is also an available demo for our ‘Enhanced Windows Built-In Modules Compatibility feature that shows its capabilities.

Enjoy,
kyREcon

Shellter Pro Plus v8.3 [Released]

Our latest version update of Shellter Pro Plus software series is available to download.

We have introduced a major upgrade to our DLL infection capabilities that enables the user to backdoor and application through a DLL in a faster and more efficient way.

This was a feature request from our customers and so we are extra proud that we managed to deliver this one.

There is also an available demo for our ‘Enhanced Application DLL Backdooring’ feature that shows its capabilities.

Enjoy,
kyREcon