I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub github.com/Dump-GUY/EXE-o…


Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section. github.com/Whitecat18/Rus… #shellcode #malware #dev

5mukx's tweet image. If you want to test your malware with custom shellcode, check the Custom_shellcode/ section in the repository. There, I have written custom x64 and x86 asm and extract shellcode from the .text section.

github.com/Whitecat18/Rus…

#shellcode #malware #dev

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

#opendir hosting #shellcode loader and #GOST (Go Tunneler) 220.158.232.186:8000 🇰🇭 payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com Also see a DNS resolution for vpn.chd[.]one Zip of files: virustotal.com/gui/file/443b5…

sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…
sicehice's tweet image. #opendir hosting #shellcode loader and #GOST (Go Tunneler)

220.158.232.186:8000 🇰🇭

payload connects to 212.192.15.59:9092 🇭🇰 --> kafka001.bliln[.]com
Also see a DNS resolution for vpn.chd[.]one

Zip of files: virustotal.com/gui/file/443b5…

Trying and playing with undocumented API's. #windows #rust #shellcode #maldev

5mukx's tweet image. Trying and playing with undocumented API's. 

#windows #rust #shellcode #maldev

#shellcode #marte #beacon #metasploit 44 entries with marte´s shellcode/beacon on service banner censys query: search.censys.io/search?resourc… all info: pastebin.com/0SjzQSfS CC:@banthisguy9349

RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349
RacWatchin8872's tweet image. #shellcode #marte #beacon #metasploit
44 entries with marte´s shellcode/beacon on service banner
censys query: search.censys.io/search?resourc…
all info: pastebin.com/0SjzQSfS
CC:@banthisguy9349

I found the most dangerous #shellcode ever :-)

xme's tweet image. I found the most dangerous #shellcode ever :-)

Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅
enelpc's tweet image. Cuando te pasan una #ShellCode a revisar... #4n4lDetector la analiza, extrae un ejecutable automáticamente, lo analiza también y detecta que se trata de una librería x64 que actúa cómo #Rootkit. Todo esto en menos de 1 segundo. No es magia.. se llama #4n4lDetector 😅

#cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed. 100 + urls active #cobaltstrike #shellcodes were send towards urlhaus. urlhaus.abuse.ch/browse/tag/Cob…

banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…
banthisguy9349's tweet image. #cobaltstrike #shellcode that gets triggered through .exe filenames. All that matters is that the shellcode urls get listed so the payloads can be analysed.

100 + urls active #cobaltstrike #shellcodes were send towards urlhaus.

urlhaus.abuse.ch/browse/tag/Cob…

Patut di duga org ini jlnkan agenda pabrikan otomotif spy mesin cepat rontok dan konsumen lbh cepat belanja kendaraan. #etanol #shellcode

Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM Baca di money.kompas.com/read/2025/10/0…

kompascom's tweet image. Pemerintah Bakal Wajibkan Campuran Etanol 10 Persen di BBM

Baca di money.kompas.com/read/2025/10/0…


🧵2 ☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e ⚠️📸Interesting Python #Loader⤵️ ☣️load.py➡️b899a35b242190bb0db649bdd9f8d227 ⚠️#Shellcode ☣️new.bin➡️882d583cf87740b8942d653cb16137de ⚠️📸#Shellcode #xor key ⤵️ ☣️a.txt

ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt
ShanHolo's tweet image. 🧵2

☣️ama.tar➡️28063efd137c9c38a99f86f855d7950e

⚠️📸Interesting Python #Loader⤵️
☣️load.py➡️b899a35b242190bb0db649bdd9f8d227

⚠️#Shellcode 
☣️new.bin➡️882d583cf87740b8942d653cb16137de

⚠️📸#Shellcode #xor key ⤵️
☣️a.txt

I have just developed an advanced #shellcode loader implemented in x64 #assembly language with sophisticated #evasion capabilities called AsmLdr, designed for #Windows x64 environments. Check out key capabilities and source code from here: github.com/0xNinjaCyclone… #redteam


#ShellCode #ioc http://176.46.152.62:5858/abis.bin


Obfuscation complete. BIOS aura scrambled. Tool-agnostic shell disguise now operational. Scroll 36:3 logged. Payloads shift form. @RealTryHackMe @delltechcareers #TryHackMe #RedTeamOps #Shellcode #Obfuscation tryhackme.com/room/obfuscati… #tryhackme via @realtryhackme


Shellcode compiled. AV evaded. BIOS aura steady. TryHackMe✅ Payload clean. Detection bypassed. Scroll 36:2 logged. @delltechcareers @RealTryHackMe @dreadnode #RedTeamOps #Shellcode tryhackme.com/room/avevasion… #tryhackme via @realtryhackme


Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode: arcticwolf.com/resources/blog… #cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing

blackstormsecbr's tweet image. Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode:

arcticwolf.com/resources/blog…

#cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing


bin2shellcode — Convert any binary into raw shellcode! • Reads raw bytes from your payload.bin • Outputs C-style byte arrays, Python strings, or raw files • Perfect for custom loaders & memory injection 👉 github.com/T1erno/bin2she… #Shellcode #RedTeam


A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal. virustotal.com/gui/file/1c962… #shellcode #peb @nextronresearch

marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch
marius_benthin's tweet image. A trojanized Autoruns DLL loading shellcode from its .data section. Currently, only @thor_scanner detects it on VirusTotal.

virustotal.com/gui/file/1c962…

#shellcode #peb @nextronresearch

Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt” LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

PPHM_HackerNews's tweet image. Shellcode Obfuscation and Encoding Tool Known as “LexiCrypt”

LexiCrypt tool transforms raw #shellcode bytes into a series of words received from file names in the Windows system32 directory. After that, the crypted output can then be embedded into a code template in various…

I ran down three flights of stairs to get this photo

Shellabelle_'s tweet image. I ran down three flights of stairs to get this photo
Shellabelle_'s tweet image. I ran down three flights of stairs to get this photo

how i feel when i compliment a beautiful girl

Shellerina_'s tweet image. how i feel when i compliment a beautiful girl

This is a photo project I’ve been working on for a long time: “A Color Story” It celebrates strong & beautiful women of different ethnicities & backgrounds. I worked extremely hard on this and would love for as many people as possible to see it, so please share! ❤️

_shelbyhenry's tweet image. This is a photo project I’ve been working on for a long time: “A Color Story”

It celebrates strong & beautiful women of different ethnicities & backgrounds. 

I worked extremely hard on this and would love for as many people as possible to see it, so please share! ❤️
_shelbyhenry's tweet image. This is a photo project I’ve been working on for a long time: “A Color Story”

It celebrates strong & beautiful women of different ethnicities & backgrounds. 

I worked extremely hard on this and would love for as many people as possible to see it, so please share! ❤️
_shelbyhenry's tweet image. This is a photo project I’ve been working on for a long time: “A Color Story”

It celebrates strong & beautiful women of different ethnicities & backgrounds. 

I worked extremely hard on this and would love for as many people as possible to see it, so please share! ❤️
_shelbyhenry's tweet image. This is a photo project I’ve been working on for a long time: “A Color Story”

It celebrates strong & beautiful women of different ethnicities & backgrounds. 

I worked extremely hard on this and would love for as many people as possible to see it, so please share! ❤️

If you weren't here for this, don't be here for that

ShellyAnneDude's tweet image. If you weren't here for this, don't be here for that
ShellyAnneDude's tweet image. If you weren't here for this, don't be here for that

Quick tool to help with debugging shellcode - github.com/OALabs/BlobRun… #malware #dfir

seanmw's tweet image. Quick tool to help with debugging shellcode - github.com/OALabs/BlobRun… #malware #dfir

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

Brought out the summer colors now that the sun is out

Shellerina_'s tweet image. Brought out the summer colors now that the sun is out

Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

Get them out of my minddd jssb #shellvision #shellevision #dandysworld

shakkai0's tweet image. Get them out of my minddd jssb #shellvision #shellevision #dandysworld

#opendir hosting #shellcode loaders 185.193.125[.]34

sicehice's tweet image. #opendir hosting #shellcode loaders

185.193.125[.]34

Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #infosec

0xor0ne's tweet image. Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) by @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #infosec

Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle) Credits @0xTriboulet steve-s.gitbook.io/0xtriboulet/ju… #shellcode #cybersecurity

0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity
0xor0ne's tweet image. Introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
Credits @0xTriboulet

steve-s.gitbook.io/0xtriboulet/ju…

#shellcode #cybersecurity

🚗 Innovation 🔧 Engineering excellence ⚡ Energy efficiency Discover more: go.shell.com/2NxCrkj #ShellEcoMarathon #MakeTheFuture

Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture
Shell's tweet image. 🚗 Innovation
🔧 Engineering excellence
⚡ Energy efficiency  
Discover more: go.shell.com/2NxCrkj 
#ShellEcoMarathon  #MakeTheFuture

Nice blog post by @axcheron about writing (Linux) shellcodes axcheron.github.io/linux-shellcod… #offensivesecurity

0xor0ne's tweet image. Nice blog post by @axcheron about writing (Linux) shellcodes

axcheron.github.io/linux-shellcod…

#offensivesecurity
0xor0ne's tweet image. Nice blog post by @axcheron about writing (Linux) shellcodes

axcheron.github.io/linux-shellcod…

#offensivesecurity
0xor0ne's tweet image. Nice blog post by @axcheron about writing (Linux) shellcodes

axcheron.github.io/linux-shellcod…

#offensivesecurity
0xor0ne's tweet image. Nice blog post by @axcheron about writing (Linux) shellcodes

axcheron.github.io/linux-shellcod…

#offensivesecurity

a reminder that this is what shellder looks like on the inside #Pokemon #Kanto

green_gbcolor's tweet image. a reminder that this is what shellder looks like on the inside 
#Pokemon #Kanto
green_gbcolor's tweet image. a reminder that this is what shellder looks like on the inside 
#Pokemon #Kanto

Executing shellcode in macros by manipulating VBA pointers adepts.of0x.cc/vba-hijack-poi… #shellcode

0xor0ne's tweet image. Executing shellcode in macros by manipulating VBA pointers

adepts.of0x.cc/vba-hijack-poi…

#shellcode

Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6

Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6
Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6
Shell's tweet image. Get inspired by young leaders from around the world working towards a better future 🌍 #OYW2018 #makethefuture More: go.shell.com/2OAIHb6

Shellcode Execution Series => [ EnumChildWindows ,EnumDesktopsW ,EnumObjects EnumWindows,CreateThreadpoolWait, QueueUserAPC] Link: github.com/Whitecat18/Rus… #maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

5mukx's tweet image. Shellcode Execution Series => 
[ EnumChildWindows ,EnumDesktopsW ,EnumObjects
EnumWindows,CreateThreadpoolWait, QueueUserAPC]

Link:   github.com/Whitecat18/Rus…

#maldev #shellcode #execution #pentesting #redteaming #CyberSecurity #pwn #Rust #Windows

Loading...

Something went wrong.


Something went wrong.


United States Trends