thefLink

57 posts

thefLink

thefLink

@thefLinkk

Katılım Temmuz 2018
150 Takip Edilen1.2K Takipçiler
Sabitlenmiş Tweet
thefLink
thefLink@thefLinkk·
Here is my variant of Gargoyle for x64 to evade memory scanners. Fully relies on ROP and PIC without any APC. Huge thanks to @waldoirc for the documentation. github.com/thefLink/DeepS…
English
3
152
373
0
Gabriel Landau
Gabriel Landau@GabrielLandau·
Is there a term for fear of success, thinking you’ve peaked and will never hit the same high again? I imagine there’s some 30-letter German word for it.
English
3
0
7
1.4K
thefLink
thefLink@thefLinkk·
As presented @x33fcon, this bigger update of Hunt-Sleeping-Beacons allows enumerating pending timers and their callbacks to identify timer-based sleepmasks. Additional detection ideas included :-) github.com/thefLink/Hunt-…
thefLink tweet mediathefLink tweet media
English
1
33
110
8.1K
thefLink retweetledi
Fabian
Fabian@testert01·
[RELEASE] EvtPsst a small mute tool developed by me, that abuses exposed SYNCHRONIZE and Token handles in order to get a process handle to the EventLog Process with more access. Blogpost over the techniques will follow in the next days. github.com/nothingspecial… #redteam
English
0
14
21
2.8K
thefLink
thefLink@thefLinkk·
Here is a little ETW based tool to play with different IOCs by ImageLoad events. I feel like proxying Kernel32!LoadLibrary through Ntdll is a very strong IOC. :-) github.com/thefLink/Hunt-…
English
1
44
127
19.6K
thefLink
thefLink@thefLinkk·
Here is a ETW based POC to monitor for (some) direct and indirect syscalls. Should find multiple open source implementations trying to avoid userlandhooks. github.com/thefLink/Hunt-…
English
2
59
154
18.2K
thefLink
thefLink@thefLinkk·
Added an attempt to detect suspicious and blocking callbacks of timers to Hunt-Sleeping-Beacons. Probably detects some C2 using timer callbacks for sleep encryption github.com/thefLink/Hunt-…
English
3
21
80
0
thefLink
thefLink@thefLinkk·
@codex_tf2 Electron apps in general are fps I believe :(.
English
1
0
3
0
thefLink
thefLink@thefLinkk·
Just pushed a detection idea for Foliage/AceLdr to Hunt-Sleeping-Beacons. State Wait:UserRequest is triggered by KiUserApcDispatcher? Probably a Beacon :-) github.com/thefLink/Hunt-…
English
3
53
128
0
thefLink retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Our @thefLinkk and @TjarkRasche will give a workshop tomorrow at @bsidesbud on creating complex offensive tools as PIC. Come and learn about offensive coding techniques, memory artifacts and benefits of coding tools as PIC.
English
0
9
14
0
thefLink
thefLink@thefLinkk·
Here is another implementation of Hellsgate + Halosgate It makes sure, that all resolved syscalls go through ntdll.dll by reusing syscall;ret instructions from clean syscall stubs. github.com/thefLink/Recyc…
English
1
47
111
0
thefLink
thefLink@thefLinkk·
Here is an idea to identify running beacons: 1. Beacons ThreadState often is: DelayExecution 2. Calltrace to NtDelayExecution includes unknown regions Works also fine against beacons sitting in file backed memory github.com/thefLink/Hunt-…
English
1
67
164
0