I am currently working on my own RAT and I got a FUD reverse shell.
But I have a problem.
I can only connect to the shell with netcat. But I want to use Meterpreter because I can do more things with it.
If I start a listener on metasploit I get a connection and a shell but if I move the session to the background and connect again I don’t get the connection again.
I don’t want to use the code anymore and that’s why I am wondering if there is another way to bypass Windows Defender or make it FUD with a meterpreter.
I tried code like VeilEvasion or unicorn but these are outdated and don’t work anymore.