#shellcode resultados da pesquisa

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub github.com/Dump-GUY/EXE-o…


A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅
enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

Rare Earth Material Lure Delivering Shellcode Loader Quick notes on a fiber-based shellcode loader delivered using a Rare Earth Material lure #APT #shellcode dmpdump.github.io/posts/Reia/


#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…

banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…
banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…

If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section. github.com/Whitecat18/Rus… #shellcode #malware #dev

5mukx's tweet image. If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section.

github.com/Whitecat18/Rus…

#shellcode #malware #dev

http://148.135.119.4:9999/ #Opendir with some interesting files payload[.]bin #marte #shellcode #backdoor artifact[.]exe #cobaltstrike #hacktool urlhaus.abuse.ch/host/148.135.1… AS35916 MULTA-ASN1

banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1
banthisguy9349's tweet image. http://148.135.119.4:9999/ #Opendir with some interesting files 

payload[.]bin #marte #shellcode #backdoor
artifact[.]exe #cobaltstrike #hacktool

urlhaus.abuse.ch/host/148.135.1…

AS35916 MULTA-ASN1

PoolParty is a collection of fully-undetectable process injection techniques abusing Windows Thread Pools. Presented at Black Hat EU 2023 Briefings securityonline.info/poolparty-a-se… #shellcode #undetectable #injection

the_yellow_fall's tweet image. PoolParty is a collection of fully-undetectable process injection techniques abusing Windows Thread Pools. Presented at Black Hat EU 2023 Briefings
securityonline.info/poolparty-a-se…
#shellcode #undetectable #injection

Nenhum resultado para "#shellcode"
Nenhum resultado para "#shellcode"
Loading...

Something went wrong.


Something went wrong.


United States Trends