#shellcode 검색 결과

"#shellcode"에 대한 결과가 없습니다
"#shellcode"에 대한 결과가 없습니다
"#shellcode"에 대한 결과가 없습니다

When I'm bored I look for this kind of #Opendir. Same TA behind? 🤔 #Citrix CVE-2023-3519 exploit and #shellcode hxxp://155.248.183.38:8000/README.md hxxp://155.248.183.38:8000/📷 hxxp://128.199.145.171:88/📷

ShanHolo's tweet image. When I'm bored I look for this kind of #Opendir.
 Same TA behind? 🤔

#Citrix CVE-2023-3519 exploit and #shellcode 

hxxp://155.248.183.38:8000/README.md 

hxxp://155.248.183.38:8000/📷
hxxp://128.199.145.171:88/📷
ShanHolo's tweet image. When I'm bored I look for this kind of #Opendir.
 Same TA behind? 🤔

#Citrix CVE-2023-3519 exploit and #shellcode 

hxxp://155.248.183.38:8000/README.md 

hxxp://155.248.183.38:8000/📷
hxxp://128.199.145.171:88/📷
ShanHolo's tweet image. When I'm bored I look for this kind of #Opendir.
 Same TA behind? 🤔

#Citrix CVE-2023-3519 exploit and #shellcode 

hxxp://155.248.183.38:8000/README.md 

hxxp://155.248.183.38:8000/📷
hxxp://128.199.145.171:88/📷
ShanHolo's tweet image. When I'm bored I look for this kind of #Opendir.
 Same TA behind? 🤔

#Citrix CVE-2023-3519 exploit and #shellcode 

hxxp://155.248.183.38:8000/README.md 

hxxp://155.248.183.38:8000/📷
hxxp://128.199.145.171:88/📷

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

Check our rule for detecting #shellcode with low detections valhalla.nextron-systems.com/info/rule/MAL_…

MalGamy12's tweet image. Check our rule for detecting #shellcode with low detections
valhalla.nextron-systems.com/info/rule/MAL_…
MalGamy12's tweet image. Check our rule for detecting #shellcode with low detections
valhalla.nextron-systems.com/info/rule/MAL_…
MalGamy12's tweet image. Check our rule for detecting #shellcode with low detections
valhalla.nextron-systems.com/info/rule/MAL_…
MalGamy12's tweet image. Check our rule for detecting #shellcode with low detections
valhalla.nextron-systems.com/info/rule/MAL_…

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

#opendir hosting #shellcode loaders 185.193.125[.]34

sicehice's tweet image. #opendir hosting #shellcode loaders

185.193.125[.]34

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

Shellcode Execution via EnumSystemLocalA #shellcode #Local

freeprogrammers's tweet image. Shellcode Execution via EnumSystemLocalA
#shellcode #Local

🐍 Double Venom (DVenom) A tool that helps #redteam bypass AVs by providing an encryption wrapper and loader for your #shellcode. 🛡️ Capable of bypassing some well-known antivirus (AVs). 🔒 Offers multiple encryption methods including RC4, AES256, XOR, and ROT. 🏗️ Produces…

hack_git's tweet image. 🐍 Double Venom (DVenom)

A tool that helps #redteam bypass AVs by providing an encryption wrapper and loader for your #shellcode.

🛡️ Capable of bypassing some well-known antivirus (AVs).
🔒 Offers multiple encryption methods including RC4, AES256, XOR, and ROT.
🏗️ Produces…

#opendir #C2 #shellcode #Meterpreter http://34.174.239[.]174/ C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051

lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051
lontze7's tweet image. #opendir #C2 #shellcode #Meterpreter

http://34.174.239[.]174/

C2: 34.174.239[.]174:9001 , https://local.techwall[.]xyz:9051

X64 Syscall Shellcode via ASM I wrote it for ekoparty2025_challenge. So its also a writeUp for BinaryGecko Reach the blog at the link below -> enessakircolak.netlify.app/posts/2025/sys… #Shellcode #Assembly #Windows #binarygecko #exploit #reverseengineering #microsoft #x64

enessakircolak's tweet image. X64 Syscall Shellcode via ASM

I wrote it for ekoparty2025_challenge.
So its also a writeUp for BinaryGecko 

Reach the blog at the link below ->
enessakircolak.netlify.app/posts/2025/sys…

#Shellcode #Assembly #Windows #binarygecko #exploit #reverseengineering #microsoft #x64

http://148.135.119.4:9999/ #Opendir with some interesting files payload[.]bin #marte #shellcode #backdoor artifact[.]exe #cobaltstrike #hacktool urlhaus.abuse.ch/host/148.135.1… AS35916 MULTA-ASN1

banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1
banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1

#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…

banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…
banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…

If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section. github.com/Whitecat18/Rus… #shellcode #malware #dev

5mukx's tweet image. If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section.

github.com/Whitecat18/Rus…

#shellcode #malware #dev

Loading...

Something went wrong.


Something went wrong.


United States Trends