codex_tf2's profile picture. advanced persistent clown 🤡
📕 redteam blog: http://codex-7.gitbook.io  
🛠️ github: http://github.com/CodeXTF2

CodeX

@codex_tf2

advanced persistent clown 🤡 📕 redteam blog: http://codex-7.gitbook.io 🛠️ github: http://github.com/CodeXTF2

Angepinnt

[Pin] My maldev link dump if anyone else wants to read :D (Will be updated) raw.githubusercontent.com/CodeXTF2/malde…


mfw hashcat v7 b4 gta6

hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…

hashcat's tweet image. hashcat v7.0.0 released! 

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. 

Detailed writeup is available here: hashcat.net/forum/thread-1…


CodeX hat repostet

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…


average day as an aggressorscript victim

codex_tf2's tweet image. average day as an aggressorscript victim

CodeX hat repostet

ah interesting


CodeX hat repostet

Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender. COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore... A post by @es3n1n. Nicely done! Repo:…

SEKTOR7net's tweet image. Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender.

COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore...

A post by @es3n1n. Nicely done!

Repo:…

CodeX hat repostet

This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…


CodeX hat repostet

Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also implementing your own ransomware/decryptor for Windows, MacOS and Linux. See you soon! 👻

C5pider's tweet image. Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also  implementing your own ransomware/decryptor for Windows, MacOS and Linux.
See you soon! 👻
C5pider's tweet image. Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also  implementing your own ransomware/decryptor for Windows, MacOS and Linux.
See you soon! 👻

Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. Some teasers of what to expect, with some painstakingly crafted slides 🙃

rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃
rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃
rad9800's tweet image. Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. 

Some teasers of what to expect, with some painstakingly crafted slides 🙃


CodeX hat repostet

So excited to speak at #BHUSA for the first time this year! I'll talk about training LLMs on verifiable tasks (including what exactly that means) with a case study automating some maldev work.


CodeX hat repostet

I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. github.com/MEhrn00/boflink Supporting blog post about it. blog.cybershenanigans.space/posts/boflink-…


CodeX hat repostet

I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…


CodeX hat repostet

Learn to evade and strengthen security controls by building your own ransomware. For a teaser on what to expect, check out my talk 'Windows Ransomware Detection' youtu.be/5t67BFcC-MQ Excited to have y'all join us next month.

rad9800's tweet card. OnlyMalware: Windows Ransomware Detection

youtube.com

YouTube

OnlyMalware: Windows Ransomware Detection

🛠️Join @rad9800 and @C5pider for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows…

x33fcon's tweet image. 🛠️Join @rad9800 and @C5pider for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows…


a certain certification vendor must be fuming right now

codex_tf2's tweet image. a certain certification vendor must be fuming right now

CodeX hat repostet

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-the…


wtf bro has a larger bounty than john wick 😭

codex_tf2's tweet image. wtf bro has a larger bounty than john wick 😭
codex_tf2's tweet image. wtf bro has a larger bounty than john wick 😭

CodeX hat repostet

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…


CodeX hat repostet

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading github.com/Tylous/FaceDan…


CodeX hat repostet

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki


CodeX hat repostet

All Red Teamers should be aware of post beacon loss syndrome, and the stages that you go through. Denial - "the user has probably just gone offline for the day", "maybe my redirector is fucked", "did I crash the process".


Loading...

Something went wrong.


Something went wrong.