codex_tf2's profile picture. advanced persistent clown 🤡
📕 redteam blog: http://codex-7.gitbook.io  
🛠️ github: http://github.com/CodeXTF2

CodeX

@codex_tf2

advanced persistent clown 🤡 📕 redteam blog: http://codex-7.gitbook.io 🛠️ github: http://github.com/CodeXTF2

Pinned

[Pin] My maldev link dump if anyone else wants to read :D (Will be updated) raw.githubusercontent.com/CodeXTF2/malde…


Added my ICMP, NTP and Websocket C2 channel examples to the public repo. github.com/CodeXTF2/Custo… Also accompanying blog post explaining the template: codex-7.gitbook.io/codexs-termina… pls no flame bad code :D Websocket channel in action:


Added a few more example C2 channels to the Cobalt Strike custom c2 channel template on top of the existing file read/write PoC: - named pipe - TCP - UDP github.com/CodeXTF2/Custo…


Open sourced my template code for implementing custom C2 channels via a UDRL hook in Cobalt Strike Hopefully this makes developing custom c2 channels for CS easier, because externalC2 spec is a pain. Or just use the upcoming UDC2 interface /shrug github.com/CodeXTF2/Custo…


Been using @_RastaMouse 's crystal kit as a UDRL dev template for the past few days and did quite a few cool things, among them was implementing a custom c2 channel template (in this case, PoC using files on disk as the channel) using IAT hooks on the wininet functions

codex_tf2's tweet image. Been using @_RastaMouse 's crystal kit as a UDRL dev template for the past few days and did quite a few cool things, among them was implementing a custom c2 channel template (in this case, PoC using files on disk as the channel) using IAT hooks on the wininet functions

mfw hashcat v7 b4 gta6

hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…

hashcat's tweet image. hashcat v7.0.0 released! 

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. 

Detailed writeup is available here: hashcat.net/forum/thread-1…


CodeX reposted

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…


average day as an aggressorscript victim

codex_tf2's tweet image. average day as an aggressorscript victim

CodeX reposted

ah interesting


CodeX reposted

Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender. COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore... A post by @es3n1n. Nicely done! Repo:…

SEKTOR7net's tweet image. Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender.

COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore...

A post by @es3n1n. Nicely done!

Repo:…

CodeX reposted

This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…


CodeX reposted

Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also implementing your own ransomware/decryptor for Windows, MacOS and Linux. See you soon! 👻

C5pider's tweet image. Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also  implementing your own ransomware/decryptor for Windows, MacOS and Linux.
See you soon! 👻
C5pider's tweet image. Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also  implementing your own ransomware/decryptor for Windows, MacOS and Linux.
See you soon! 👻

Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. Some teasers of what to expect, with some painstakingly crafted slides 🙃

rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃
rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃
rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃


CodeX reposted

So excited to speak at #BHUSA for the first time this year! I'll talk about training LLMs on verifiable tasks (including what exactly that means) with a case study automating some maldev work.


CodeX reposted

I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. github.com/MEhrn00/boflink Supporting blog post about it. blog.cybershenanigans.space/posts/boflink-…


CodeX reposted

I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…


CodeX reposted

Learn to evade and strengthen security controls by building your own ransomware. For a teaser on what to expect, check out my talk 'Windows Ransomware Detection' youtu.be/5t67BFcC-MQ Excited to have y'all join us next month.

rad9800's tweet card. OnlyMalware: Windows Ransomware Detection

youtube.com

YouTube

OnlyMalware: Windows Ransomware Detection

🛠️Join @rad9800 and @C5pider for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows…

x33fcon's tweet image. 🛠️Join @rad9800 and @C5pider for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows…


a certain certification vendor must be fuming right now

codex_tf2's tweet image. a certain certification vendor must be fuming right now

CodeX reposted

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-the…


wtf bro has a larger bounty than john wick 😭

codex_tf2's tweet image. wtf bro has a larger bounty than john wick 😭
codex_tf2's tweet image. wtf bro has a larger bounty than john wick 😭

CodeX reposted

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…


Loading...

Something went wrong.


Something went wrong.