Create Trojans with Windows Executables

ice-wzl
7 min readOct 11, 2021

This will be the first in a series of articles discussing various methods to backdoor everyday Windows executables, providing us with reverse shells to a target device. Having the ability to backdoor a normal executable affords us a better chance to remain undetected, juxtaposed to leaving an obvious shell.exe on the target host for long durations of time. What we will cover today starts, and remains at a basic level…

--

--

ice-wzl

Reverse Engineer, Red Teamer, CTF fan & creator