In this tutorial, we demonstrate how to extract and replace icons using Resource Hacker to make an EXE file appear as a PDF document.
We also show how to build a custom payload and client using the HexSec server-client manager — all in a controlled and educational context.
Chapters:
0:00 - Intro & Disclaimer
0:30 - What is Resource Hacker
1:10 - Extracting PDF Icons from Edge
2:05 - Replacing the EXE Icon
3:00 - Building the Payload in HexSec Manager
4:00 - How the File Looks in Windows
4:30 - AV & EDR Considerations
5:00 - Outro & Resources
References used:
www.angusj.com/resourcehacker/
Free Udemy course:
www.udemy.com/user/kruel-illioth/
Support the HexSec Community
If you find value in our work and would like to support the HexSec community, you can contribute by making a donation. Your support helps us continue developing innovative and high-quality tools for the cybersecurity and IT community.
Donate:
ETH: 0x3E79B73e3ce33c6B860425DCB40c6D2f4F2aC508
BTC: bc1qpex9u7x4a6kj4nf6fee7mz54vsv4th2rj2pt30
DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.
We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.
Stay connected:
Contact on Telegram: @Hexsecteam
Group on Telegram: @hexsec_tools
Udemy: udemy.com/user/kruel-illioth/
Github: github.com/hexsecteam
#HexSec #ResourceHacker #CyberSecurity #EthicalHacking #Payload #EXEtoPDF #SocialEngineering #PenTest