#shellcode wyniki wyszukiwania
Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows
I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam
Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec
Check our rule for detecting #shellcode with low detections valhalla.nextron-systems.com/info/rule/MAL_…
Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity
Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode
Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode
#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349
Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub github.com/Dump-GUY/EXE-o…
Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity
A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch
Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅
If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section. github.com/Whitecat18/Rus… #shellcode #malware #dev
Let’s write basic #shellcode in under 3 minutes with Andrew Bellini. Start the timer and: 1️⃣ Pick a Linux syscall 2️⃣ Write the Assembly that makes the syscall happen 3️⃣ Assemble and extract the raw shellcode from the binary This is the first installment of a multi-part…
#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…
http://148.135.119.4:9999/ #Opendir with some interesting files payload[.]bin #marte #shellcode #backdoor artifact[.]exe #cobaltstrike #hacktool urlhaus.abuse.ch/host/148.135.1… AS35916 MULTA-ASN1
- تکنیکهای اکسپلویت کردن: #BufferOverflow #Shellcode #ROP (Return-Oriented Programming) #FSA (Format String Attack) #GOT (Global Offset Table) Overwrite #ret2dlresolve Mitigation Bypasses (See the list below) #glibc Heap Exploitation (TBD) 4
Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows
Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec
matro7sh_loaders This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b) github.com/matro7sh/matro… #cybersecurity #infosec #pentesting #redteam
Check our rule for detecting #shellcode with low detections valhalla.nextron-systems.com/info/rule/MAL_…
Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity
Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode
Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode
Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity
#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349
#opendir #C2 #shellcode #Meterpreter http://34.174.239[.]174/ C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
X64 Syscall Shellcode via ASM I wrote it for ekoparty2025_challenge. So its also a writeUp for BinaryGecko Reach the blog at the link below -> enessakircolak.netlify.app/posts/2025/sys… #Shellcode #Assembly #Windows #binarygecko #exploit #reverseengineering #microsoft #x64
🐍 Double Venom (DVenom) A tool that helps #redteam bypass AVs by providing an encryption wrapper and loader for your #shellcode. 🛡️ Capable of bypassing some well-known antivirus (AVs). 🔒 Offers multiple encryption methods including RC4, AES256, XOR, and ROT. 🏗️ Produces…
A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch
#opendir hosting #SliverC2 and #shellcode 174.49.101[.]134:80 C2: xyz.hackersdog[.]com:8888 --> 174.49.101[.]134:8888 MD5s: f8374bc36d3925ea106e6230d4535054 4f0233b04b931b70e739083fb4438be2 16c36abaeeeff56ebd58946f80d358b0 40b9cc506a308808a865f0ef76c14b4a
#opendir hosting #SilverC2 and #shellcode #loader 143.198.68[.]62:8080 C2: 143.198.68[.]62:8888 main.go: 8c44bb6e3eb8ad775c9f07994bb5cda1 test1.exe: eae20dc5eacb216a11b23d6a8c0e33d7
#opendir hosting #shellcode #payload 68.233.113.39:8000 Payload connects to 68.233.113.39:8001 Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file: 56f0e8485711d746f8d36b7d6e3a7286
Something went wrong.
Something went wrong.
United States Trends
- 1. #IDontWantToOverreactBUT 1,128 posts
- 2. #MondayMotivation 37.1K posts
- 3. Howie 8,559 posts
- 4. Phillips 506K posts
- 5. #maddiekowalski N/A
- 6. Hobi 58.6K posts
- 7. Victory Monday 3,664 posts
- 8. Bradley 7,492 posts
- 9. 60 Minutes 130K posts
- 10. Clemens N/A
- 11. Good Monday 53.8K posts
- 12. Winthrop 1,681 posts
- 13. $IREN 17.6K posts
- 14. Tomorrow is Election Day 1,684 posts
- 15. Ben Shapiro 5,914 posts
- 16. #MondayVibes 3,483 posts
- 17. $QURE 2,448 posts
- 18. #BuschPlayoffPush N/A
- 19. Mattingly 1,862 posts
- 20. Happy Birthday Kim 1,182 posts