Awagat Dhungana

7 posts

Awagat Dhungana banner
Awagat Dhungana

Awagat Dhungana

@4w4647

Security Researcher | Reverse Engineering • Vulnerability Research • Binary Exploitation | C/C++ • x86/x64 • Windows Internals • Malware Analysis

Lalitpur District, Nepal Katılım Mart 2026
33 Takip Edilen5 Takipçiler
Awagat Dhungana
Awagat Dhungana@4w4647·
Built a Windows x64 PIC shellcode template using PEB walking, ROR13 API hashing, and manual export parsing. No imports or IAT, just dynamic resolution and stack strings in .text github.com/4w4647/Shellco…
English
0
0
1
20
Awagat Dhungana
Awagat Dhungana@4w4647·
@smgoreli @NinjaParanoid @morphisec ROR13 hashing isn’t the real issue. The problem is shellcode relying on PEB InMemoryOrderModuleList walks without properly validating kernel32.dll, and assuming a fixed loader order (ntdll -> kernel32) which isn’t reliable across environments.
English
0
0
0
17
Michael.Gorelik
Michael.Gorelik@smgoreli·
@NinjaParanoid You making it a bit too complicated, S1 uses those decoys to stop only shellcodes that are based on PEB order, name based msf shellcodes work great, a simple change of the ror13 strings to a different formula breaks all the solutions you mentioned, @morphisec will stop those
English
2
0
0
0
Chetan Nayak (Brute Ratel C4 Author)
I think I was being a bit too polite when I posted the bypass on SentinelOne yesterday. As I said, the technique was not specific to S1, but every EDR as can be seen in the screenshot below. It's applicable for Defender ATP, Elastic, Crowdstrike, S1, Sophos and more #BruteRatel
Chetan Nayak (Brute Ratel C4 Author) tweet media
English
8
58
217
0