Hey guys welcome to pendous tools in this video I’m going to show you a great tool called top hat top hat is inspired by Metasploit capabilities of meter printer however it was coated to generate an undetected encrypted backdoor using Python top hat generates fully undetected backdoor with RSA encrypted shell RSA is one of the first public key cryptosystems.
And is widely used for secure data transmission in such a crypto system the encryption key is public and it.
Is different from the decryption key which is kept secret first we need to clone it from github second navigate to its directory unlisted sytems third run top-hat using python you just need to.
Type your local host and port to find your local IP open a new terminal and type of config if you’re using a wireless connection it will be next to W land 0 fourth start the payload handler as you can see it started a payload Handler and waiting for the victim to run the backdoor script as you can see as soon as I ran the script.
It opened a session thanks for watching please like share and subscribe and follow us on social media.