#shellcode risultati di ricerca

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub github.com/Dump-GUY/EXE-o…


Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

#opendir hosting #shellcode loader and #GOST (Go Tunneler) 220.158.232.186:8000 🇰🇭 payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com Also see a DNS resolution for vpn.chd[.]one Zip of files: virustotal.com/gui/file/443b5…

sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…
sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅
enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

I found the most dangerous #shellcode ever :-)

xme's tweet image. I found the most dangerous #shellcode ever :-)

#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…

banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…
banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…

http://148.135.119.4:9999/ #Opendir with some interesting files payload[.]bin #marte #shellcode #backdoor artifact[.]exe #cobaltstrike #hacktool urlhaus.abuse.ch/host/148.135.1… AS35916 MULTA-ASN1

banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1
banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1

Patut di duga org ini jlnkan agenda pabrikan otomotif spy mesin cepat rontok dan konsumen lbh cepat belanja kendaraan. #etanol #shellcode

Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM Baca di money.kompas.com/read/2025/10/0…

kompascom's tweet image. Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM

Baca di money.kompas.com/read/2025/10/0…


🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


#ShellCode #ioc http://176.46.152.62:5858/abis.bin


Obfuscation complete. BIOS aura scrambled. Tool-agnostic shell disguise now operational. Scroll 36:3 logged. Payloads shift form. @RealTryHackMe @delltechcareers #TryHackMe #RedTeamOps #Shellcode #Obfuscation tryhackme.com/room/obfuscati… #tryhackme via @realtryhackme


Shellcode compiled. AV evaded. BIOS aura steady. TryHackMe✅ Payload clean. Detection bypassed. Scroll 36:2 logged. @delltechcareers @RealTryHackMe @dreadnode #RedTeamOps #Shellcode tryhackme.com/room/avevasion… #tryhackme via @realtryhackme


Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode: arcticwolf.com/resources/blog… #cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing

blackstormsecbr's tweet image. Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode:

arcticwolf.com/resources/blog…

#cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing


bin2shellcode — Convert any binary into raw shellcode! • Reads raw bytes from your payload.bin • Outputs C-style byte arrays, Python strings, or raw files • Perfect for custom loaders & memory injection 👉 github.com/T1erno/bin2she… #Shellcode #RedTeam


A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt” LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

PPHM_HackerNews's tweet image. Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt”

LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

I ran down three flights of stairs to get this photo

Shellabelle_'s tweet image. I ran down three flights of stairs to get this photo
Shellabelle_'s tweet image. I ran down three flights of stairs to get this photo

Doodle of shellvision I’ll prob delete later

gengem0's tweet image. Doodle of shellvision
I’ll prob delete later

how i feel when i compliment a beautiful girl

Shellerina_'s tweet image. how i feel when i compliment a beautiful girl

If you weren't here for this, don't be here for that

ShellyAnneDude's tweet image. If you weren't here for this, don't be here for that
ShellyAnneDude's tweet image. If you weren't here for this, don't be here for that

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

ฮัลโหลวันหยุดแสนเหงา ไหนใครคิดถึงม๋าตุวนี้บ้าง แอบเอารูปงานเก่าๆมาลงให้หายคิดถึงกัน 💕✨️ [#shellybenda , #evershelly]

shellyofcth's tweet image. ฮัลโหลวันหยุดแสนเหงา ไหนใครคิดถึงม๋าตุวนี้บ้าง แอบเอารูปงานเก่าๆมาลงให้หายคิดถึงกัน 💕✨️

[#shellybenda , #evershelly]
shellyofcth's tweet image. ฮัลโหลวันหยุดแสนเหงา ไหนใครคิดถึงม๋าตุวนี้บ้าง แอบเอารูปงานเก่าๆมาลงให้หายคิดถึงกัน 💕✨️

[#shellybenda , #evershelly]

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6

Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6
Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6
Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6

#opendir hosting #shellcode loaders 185.193.125[.]34

sicehice's tweet image. #opendir hosting #shellcode loaders

185.193.125[.]34

a reminder that this is what shellder looks like on the inside #Pokemon #Kanto

green_gbcolor's tweet image. a reminder that this is what shellder looks like on the inside 
#Pokemon #Kanto
green_gbcolor's tweet image. a reminder that this is what shellder looks like on the inside 
#Pokemon #Kanto

Move around! Get as many as you can! いっぱい いーっぱい ひろってね!

Shell_UT's tweet image. Move around! Get as many as you can!
いっぱい いーっぱい ひろってね!

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

Get them out of my minddd jssb #shellvision #shellevision #dandysworld

shakkai0's tweet image. Get them out of my minddd jssb #shellvision #shellevision #dandysworld

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Brought out the summer colors now that the sun is out

Shellerina_'s tweet image. Brought out the summer colors now that the sun is out

🚗 Innovation 🔧 Engineering excellence ⚡ Energy efficiency Discover more: go.shell.com/2NxCrkj #ShellEcoMarathon #MakeTheFuture

Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture

Shellcode Execution via EnumSystemLocalA #shellcode #Local

freeprogrammers's tweet image. Shellcode Execution via EnumSystemLocalA
#shellcode #Local

Loading...

Something went wrong.


Something went wrong.


United States Trends