Guillaume Caillé

156 posts

Guillaume Caillé banner
Guillaume Caillé

Guillaume Caillé

@OffenseTeacher

Senior Director - Penetration Testing

เข้าร่วม Temmuz 2012
272 กำลังติดตาม276 ผู้ติดตาม
Guillaume Caillé รีทวีตแล้ว
ARMIRA
ARMIRA@ARMIRA2832741·
🚀 Lancement d'Armira Pro le 7 novembre 2024 ! 🎉 Redéfinissez la sécurité des données avec : ✅ Accès sécurisé ✅ Gestion simplifiée des utilisateurs ✅ Alertes en temps réel ✅ Visualisation intuitive ✅ Intégration avec OneDrive. Restez connectés pour plus d'infos ! 💡🔒
ARMIRA tweet media
Français
0
1
0
146
Cas van Cooten
Cas van Cooten@chvancooten·
Another great post by my now ex-colleague (💔) on using some concepts from Ekko to build a more resilient sleep masking technique that masquerades as a legitimate DLL while sleeping. Worth a read!
OldBoy21 ❄️@vincenzosantuc1

In-memory sleeping technique using threads created in suspended state and timers that work with the ResumeThread function in order to adapt SWAPPALA to the Reflective DLL context oldboy21.github.io/posts/2024/06/… #sleeping #memory #c #swappala #hiding #maldev #obfuscation

English
2
0
24
3.5K
Guillaume Caillé
Guillaume Caillé@OffenseTeacher·
Just published my methodology for finding good DLL side-loading candidates while avoiding using DllMain for injection to bypass Loader Lock limitations. If you have been struggling with this, I hope this saves you time in the future. okiok.com/achieving-dll-…
English
5
79
247
16.6K
Cas van Cooten
Cas van Cooten@chvancooten·
This was a lot more messy than I would've thought it to be, but an interesting project nonetheless: I got PowerShell execution via custom runspaces to work in Rust with the awesome ClrOxide library by @_yamakadi! Contributed the code as an example here: github.com/yamakadi/clrox…
Cas van Cooten tweet media
English
4
10
44
5.7K
Guillaume Caillé รีทวีตแล้ว
Étienne Ducharme
Étienne Ducharme@b13bs_·
How's your M365 password spraying game in 2024 ? On my side, it's harder than ever. For instance, after 6 rounds each 6 hours apart, starting to lock out accounts more and more each round, to the point where impact is noticeable. Rounds performed using the great #TeamFiltration
English
0
1
0
236
WarTranslated
WarTranslated@wartranslated·
russian news outlet RIA continues pursuing the line about the "French mercenaries" allegedly killed during a missile strike against Kharkiv and even provides a list of names. This information was allegedly "received today at one o’clock in the morning from our French activists, partisans who are monitoring the situation and sharing information". So the best thing russia could come up with to respond to increased military supply by France, including 40+ SCALP missiles, was striking a civilian building and claiming they killed some "mercenaries". ria.ru/20240122/naemn…
WarTranslated tweet mediaWarTranslated tweet media
English
107
127
1.5K
210.2K
Furkan Göksel
Furkan Göksel@R0h1rr1m·
Today I wrote a small code using Nim to emulate DLL Unlinking, one of the very old techniques. Not a fancy or new code, but if someone needs such thing, here it is: #infosec github.com/frkngksl/Unlin…
English
1
9
46
3.1K
Guillaume Caillé รีทวีตแล้ว
TrustedSec
TrustedSec@TrustedSec·
With initial access to a M365 account, Red Teamers can potentially find a treasure trove of sensitive information. @Flangvik goes over three tools (and one script) that he believes to be the modern-day Triforce for initial access. Read it now on our blog! hubs.la/Q0281CvN0
English
1
140
366
85.4K
Marcello
Marcello@byt3bl33d3r·
@HackingLZ @GuhnooPlusLinux @MJHallenbeck We were planning on continuing developing CME before they decided to fork it. After the exchange with the people who created the hostile fork I’ve honestly lost all desire for open source. CME will return as a fully commercial product as that’s somehow more acceptable
English
9
3
52
13.4K
anubis
anubis@AnubisOnSec·
@M_haggis @tastypepperoni This tool is listed in the LOLDriver, but that's why all these EDR killers and PPL methods that use BYOVD will always be inferior to using procexp.sys, this driver has been goated for a while: github.com/Yaxser/Backstab
English
1
1
2
305
The Haag™
The Haag™@M_haggis·
Just dove into this blog about bypassing Protected Process Light (PPL) on Windows using PPLBlade by @tastypepperoni ! 🤯 Written entirely in Go, this tool exposes methods to sidestep Defender's signature-based detections. 🛡️Defenders, understanding this is crucial! 🛡️ PPLBlade leverages this #LOLDrivers - PROCEXP152.sys - to open a handle to a running process, thereby allowing it to access processes that are under PPL protection. Must-read: tastypepperoni.medium.com/bypassing-defe…. Check out the driver: loldrivers.io/drivers/0567c6…
Abhijith B R@abhijithbr

Did some experiments on bypassing PPL Protection and Windows Defender, to dump LSASS. No detections so far! @tastypepperoni's PPLBlade repo: github.com/tastypepperoni… My short write-up: tacticaladversary.io/adversary-tact… #adversarytactics #redteam #tacticaladversary #PPLBlade

English
4
18
68
15.7K
Guillaume Caillé รีทวีตแล้ว
Furkan Göksel
Furkan Göksel@R0h1rr1m·
I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy! #infosec github.com/frkngksl/NimEx…
English
4
146
391
40.7K
Étienne Ducharme
Étienne Ducharme@b13bs_·
Almost done with RTO course and I learned a lot, it is very complete and up-to-date. However, one *key* material is not covered... Which MX switches is @_RastaMouse using ! We hear them in the background during the demo videos, I'm loving the sound.
English
1
0
10
2.5K
Guillaume Caillé
Guillaume Caillé@OffenseTeacher·
Here is a small POC for doing steganography with Nim-Lang. Useful for reducing payload entropy on disk or giving you a remote Killswitch. github.com/OffenseTeacher…
English
0
18
48
10.4K
Justin Elze
Justin Elze@HackingLZ·
Home network/lab is growing
Justin Elze tweet media
English
3
0
16
2.9K
Chetan Nayak (Brute Ratel C4 Author)
After various requests and DMs, I've decided to write a detailed blog on Detection Engineering and Evasion. This will explain in detail how modern EDRs such as Elastic, CS, ATP or S1 build detections, how to test/write your payloads against them, this will include everything from yara rules to kernel callbacks... Watch out this space for more information! #darkvortex
English
10
28
248
22.5K