#shellcode résultats de recherche

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub github.com/Dump-GUY/EXE-o…


Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

#opendir hosting #shellcode loader and #GOST (Go Tunneler) 220.158.232.186:8000 🇰🇭 payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com Also see a DNS resolution for vpn.chd[.]one Zip of files: virustotal.com/gui/file/443b5…

sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…
sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…

A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

d146c2f70cb0ddda09e69e694584dc39-loader e545335ca4915b81459e1cf99f7dee65-Mem dump StartServiceCtrlDispatcherA API as callback IP:64[.]44[.102.226 #CobaltStrike #beacon #shellcode #malware #cybersecurite @malwrhunterteam @JAMESWT_MHT @James_inthe_box @VK_Intel @bohops @cyb3rops

Loki_RE_artist's tweet image. d146c2f70cb0ddda09e69e694584dc39-loader
e545335ca4915b81459e1cf99f7dee65-Mem dump

StartServiceCtrlDispatcherA API as callback
IP:64[.]44[.102.226
#CobaltStrike #beacon #shellcode #malware #cybersecurite 
@malwrhunterteam @JAMESWT_MHT @James_inthe_box @VK_Intel @bohops @cyb3rops
Loki_RE_artist's tweet image. d146c2f70cb0ddda09e69e694584dc39-loader
e545335ca4915b81459e1cf99f7dee65-Mem dump

StartServiceCtrlDispatcherA API as callback
IP:64[.]44[.102.226
#CobaltStrike #beacon #shellcode #malware #cybersecurite 
@malwrhunterteam @JAMESWT_MHT @James_inthe_box @VK_Intel @bohops @cyb3rops
Loki_RE_artist's tweet image. d146c2f70cb0ddda09e69e694584dc39-loader
e545335ca4915b81459e1cf99f7dee65-Mem dump

StartServiceCtrlDispatcherA API as callback
IP:64[.]44[.102.226
#CobaltStrike #beacon #shellcode #malware #cybersecurite 
@malwrhunterteam @JAMESWT_MHT @James_inthe_box @VK_Intel @bohops @cyb3rops
Loki_RE_artist's tweet image. d146c2f70cb0ddda09e69e694584dc39-loader
e545335ca4915b81459e1cf99f7dee65-Mem dump

StartServiceCtrlDispatcherA API as callback
IP:64[.]44[.102.226
#CobaltStrike #beacon #shellcode #malware #cybersecurite 
@malwrhunterteam @JAMESWT_MHT @James_inthe_box @VK_Intel @bohops @cyb3rops

#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…

banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…
banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…

If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section. github.com/Whitecat18/Rus… #shellcode #malware #dev

5mukx's tweet image. If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section.

github.com/Whitecat18/Rus…

#shellcode #malware #dev

Let’s write basic #shellcode in under 3 minutes with Andrew Bellini. Start the timer and: 1️⃣ Pick a Linux syscall 2️⃣ Write the Assembly that makes the syscall happen 3️⃣ Assemble and extract the raw shellcode from the binary This is the first installment of a multi-part…


Patut di duga org ini jlnkan agenda pabrikan otomotif spy mesin cepat rontok dan konsumen lbh cepat belanja kendaraan. #etanol #shellcode

Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM Baca di money.kompas.com/read/2025/10/0…

kompascom's tweet image. Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM

Baca di money.kompas.com/read/2025/10/0…


🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


#ShellCode #ioc http://176.46.152.62:5858/abis.bin


Obfuscation complete. BIOS aura scrambled. Tool-agnostic shell disguise now operational. Scroll 36:3 logged. Payloads shift form. @RealTryHackMe @delltechcareers #TryHackMe #RedTeamOps #Shellcode #Obfuscation tryhackme.com/room/obfuscati… #tryhackme via @realtryhackme


Shellcode compiled. AV evaded. BIOS aura steady. TryHackMe✅ Payload clean. Detection bypassed. Scroll 36:2 logged. @delltechcareers @RealTryHackMe @dreadnode #RedTeamOps #Shellcode tryhackme.com/room/avevasion… #tryhackme via @realtryhackme


Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode: arcticwolf.com/resources/blog… #cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing

blackstormsecbr's tweet image. Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode:

arcticwolf.com/resources/blog…

#cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing


bin2shellcode — Convert any binary into raw shellcode! • Reads raw bytes from your payload.bin • Outputs C-style byte arrays, Python strings, or raw files • Perfect for custom loaders & memory injection 👉 github.com/T1erno/bin2she… #Shellcode #RedTeam


A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt” LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

PPHM_HackerNews's tweet image. Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt”

LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

#opendir hosting #shellcode loaders 185.193.125[.]34

sicehice's tweet image. #opendir hosting #shellcode loaders

185.193.125[.]34

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Shellcode Execution via EnumSystemLocalA #shellcode #Local

freeprogrammers's tweet image. Shellcode Execution via EnumSystemLocalA
#shellcode #Local

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

#opendir hosting #shellcode #payload 68.233.113.39:8000 Payload connects to 68.233.113.39:8001 Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file: 56f0e8485711d746f8d36b7d6e3a7286

sicehice's tweet image. #opendir hosting #shellcode #payload

68.233.113.39:8000

Payload connects to 68.233.113.39:8001

Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file:
56f0e8485711d746f8d36b7d6e3a7286
sicehice's tweet image. #opendir hosting #shellcode #payload

68.233.113.39:8000

Payload connects to 68.233.113.39:8001

Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file:
56f0e8485711d746f8d36b7d6e3a7286
sicehice's tweet image. #opendir hosting #shellcode #payload

68.233.113.39:8000

Payload connects to 68.233.113.39:8001

Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file:
56f0e8485711d746f8d36b7d6e3a7286
sicehice's tweet image. #opendir hosting #shellcode #payload

68.233.113.39:8000

Payload connects to 68.233.113.39:8001

Reva_CEH_Course_Installer_3.5.2.exe and reverse_modified.exe are the same file:
56f0e8485711d746f8d36b7d6e3a7286

#opendir #C2 #shellcode #Meterpreter http://34.174.239[.]174/ C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051

lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051

#opendir hosting #SliverC2 and #shellcode 174.49.101[.]134:80 C2: xyz.hackersdog[.]com:8888 --> 174.49.101[.]134:8888 MD5s: f8374bc36d3925ea106e6230d4535054 4f0233b04b931b70e739083fb4438be2 16c36abaeeeff56ebd58946f80d358b0 40b9cc506a308808a865f0ef76c14b4a

sicehice's tweet image. #opendir hosting #SliverC2 and #shellcode

174.49.101[.]134:80

C2: xyz.hackersdog[.]com:8888 --> 174.49.101[.]134:8888 

MD5s:
f8374bc36d3925ea106e6230d4535054
4f0233b04b931b70e739083fb4438be2
16c36abaeeeff56ebd58946f80d358b0
40b9cc506a308808a865f0ef76c14b4a

🐍 Double Venom (DVenom) A tool that helps #redteam bypass AVs by providing an encryption wrapper and loader for your #shellcode. 🛡️ Capable of bypassing some well-known antivirus (AVs). 🔒 Offers multiple encryption methods including RC4, AES256, XOR, and ROT. 🏗️ Produces…

hack_git's tweet image. 🐍 Double Venom (DVenom)

A tool that helps #redteam bypass AVs by providing an encryption wrapper and loader for your #shellcode.

🛡️ Capable of bypassing some well-known antivirus (AVs).
🔒 Offers multiple encryption methods including RC4, AES256, XOR, and ROT.
🏗️ Produces…

#opendir hosting #shellcode payload and loader 152.32.247[.]5:1555 rs_code.exe (shellcode loader): 492b2023401d79a35ec46902b1f5477c code_389.txt: c2fd475eeb024fea5abe3983df9be89b code_389.txt (decoded hex): 4d81e9a3c58e7288af4e5d8f5b81c0a2 Connects to hxxps://152.32.247[.]5:139

sicehice's tweet image. #opendir hosting #shellcode payload and loader

152.32.247[.]5:1555

rs_code.exe (shellcode loader): 492b2023401d79a35ec46902b1f5477c
code_389.txt: c2fd475eeb024fea5abe3983df9be89b
code_389.txt (decoded hex): 4d81e9a3c58e7288af4e5d8f5b81c0a2
Connects to hxxps://152.32.247[.]5:139
sicehice's tweet image. #opendir hosting #shellcode payload and loader

152.32.247[.]5:1555

rs_code.exe (shellcode loader): 492b2023401d79a35ec46902b1f5477c
code_389.txt: c2fd475eeb024fea5abe3983df9be89b
code_389.txt (decoded hex): 4d81e9a3c58e7288af4e5d8f5b81c0a2
Connects to hxxps://152.32.247[.]5:139

#opendir hosting #SilverC2 and #shellcode #loader 143.198.68[.]62:8080 C2: 143.198.68[.]62:8888 main.go: 8c44bb6e3eb8ad775c9f07994bb5cda1 test1.exe: eae20dc5eacb216a11b23d6a8c0e33d7

sicehice's tweet image. #opendir hosting #SilverC2 and #shellcode #loader

143.198.68[.]62:8080

C2: 143.198.68[.]62:8888 

main.go: 8c44bb6e3eb8ad775c9f07994bb5cda1
test1.exe: eae20dc5eacb216a11b23d6a8c0e33d7
sicehice's tweet image. #opendir hosting #SilverC2 and #shellcode #loader

143.198.68[.]62:8080

C2: 143.198.68[.]62:8888 

main.go: 8c44bb6e3eb8ad775c9f07994bb5cda1
test1.exe: eae20dc5eacb216a11b23d6a8c0e33d7

matro7sh_loaders This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b) github.com/matro7sh/matro… #cybersecurity #infosec #pentesting #redteam

hack_git's tweet image. matro7sh_loaders 

This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)

github.com/matro7sh/matro…

#cybersecurity #infosec #pentesting #redteam
hack_git's tweet image. matro7sh_loaders 

This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)

github.com/matro7sh/matro…

#cybersecurity #infosec #pentesting #redteam
hack_git's tweet image. matro7sh_loaders 

This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)

github.com/matro7sh/matro…

#cybersecurity #infosec #pentesting #redteam
hack_git's tweet image. matro7sh_loaders 

This script adds the ability to encode #shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)

github.com/matro7sh/matro…

#cybersecurity #infosec #pentesting #redteam

#opendir hosting #shellcode loader and #GOST (Go Tunneler) 220.158.232.186:8000 🇰🇭 payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com Also see a DNS resolution for vpn.chd[.]one Zip of files: virustotal.com/gui/file/443b5…

sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…
sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Loading...

Something went wrong.


Something went wrong.


United States Trends