🔥 New blogpost 🔥
Running PEs inline without a console.
You now can, for example, run PowerShell in CobaltStrike and obtain its output without spawning any process (including conhost.exe)
coresecurity.com/core-labs/arti…
Finally done!
My latest article introduce the basics of Windows kernel drivers/internals and how to find and exploit process killer drivers using LOLDrivers 🤓
I hope you'll enjoy it!
alice.climent-pommeret.red/posts/process-…
I just published my implementation of call stack spoofing using hardware breakpoints 😁
Works for syscalls and APIs, supports x64, x86 and WoW64.
coresecurity.com/blog/hardware-…
For the past couple of months @NUL0x4C and I have been working on a module-based malware dev training course that covers various techniques in-depth. Its emphasis is on simplifying complex concepts & evasion. Every module contains highly commented custom code. Stay tuned!
(1/) I’m really excited to reach 8k followers, thank you very much, dear Sirs and Madams 🙏🏻 I started to actively tweet about a year and a half ago and at that point I couldn't even imagine that I could get so many people somewhat interested in my content ❤️
[BLOG 📝] Some notes on how to automate the generation of Position Independent Shellcodes (without msfvenom windows/x64/exec) from object files in memory (by @NinjaParanoid) to be used in Threadless Process Injection (by @_EthicalChaos_) ⬇️
snovvcrash.rocks/2023/02/14/pic…
Finally revamped my original @hashcat rule OneRuleToRuleThemAll.
The new and improved OneRuleToRuleThemStill has ~5% reduced rules with 0% performance drop against multiple breach datasets.
Link is in the blog. Happy cracking!
in.security/2023/01/10/one…#pentest#redteam
macOS x64 shellcode that uses an eggHunter to find and decipher the command shell string. Tinkering with macOS x64 shellcoding as I work through the offsec macOS course.
Check it out here:
packetstormsecurity.com/files/170322/m…
I've been trying to get NtCreateUserProcess working in C#, but no joy yet. If anyone wants to take a stab at fixing the code, it's here:
gist.github.com/rasta-mouse/2f…
[BLOG POST] And as promised, this is a brief article the describing the technique used within SilentMoonwalk. Might be a good weekend read!
klezvirus.github.io/RedTeaming/AV_…
We have published a paper: "About malware writing and how to start"
This paper exists to address the questions we frequently encounter. It is an opinionated piece on malware development, the path to success, and some personal anecdotes
Check it out here: papers.vx-underground.org/papers/Other/V…
[RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, result of a joint research on an original technique developed by namazso, done with my friends @trickster012 and @waldoirc.
Enjoy! ;)
github.com/klezVirus/Sile…
laZzzy : a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques : github.com/capt-meelo/laZ… credits @CaptMeelo