ColdWer
#bof #av #edr #bypass #lsass @reconcore
Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass
#bof #av #edr #bypass #lsass @reconcore
GitHub
GitHub - 0xsh3llf1r3/ColdWer: Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass
Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass - 0xsh3llf1r3/ColdWer
New post: "Browser Dumping β The Core Tactic Behind Most Infostealers"
(This blog is mainly for sharing my personal notes and learning journey)
#stealer #browser #chrome #appbound @reconcore
(This blog is mainly for sharing my personal notes and learning journey)
This blog contains my own research collected from the internet, along with ideas from other blogs and studies. While many parts are written in my own words, the Most sections were copied directly from external sources because they were already very well written and clearly expressed. This blog is mainly for sharing my personal notes and learning journey.
#stealer #browser #chrome #appbound @reconcore
RESEARCH.ME
Browser Dumping: The Core Tactic Behind Most Infostealers
This blog contains my own research collected from the internet, along with ideas from other blogs and studies. While many parts are written in my own words, the Most sections were copied directly from external sources because they were already very well writtenβ¦
POC-CVE-2026-1357 WPvivid Backup & Migration RCE PoC
#vulnerability #rce #poc @reconcore
Vulnerability: Unauthenticated Arbitrary File Upload leading to Remote Code Execution (RCE)
CVE ID: CVE-2026-1357
CVSS: Critical(9.8)
Status: Patched in version 0.9.124
#vulnerability #rce #poc @reconcore
GitHub
GitHub - LucasM0ntes/POC-CVE-2026-1357: POC-CVE-2026-1357
POC-CVE-2026-1357. Contribute to LucasM0ntes/POC-CVE-2026-1357 development by creating an account on GitHub.
Crystal Kit
#evasion @reconcore
This repo is a technical and social experiment to explore whether replacing Cobalt Strike's evasion primitives (Sleepmask/BeaconGate) with a Crystal Palace PICO is feasible (or even desirable) for advanced evasion scenarios
#evasion @reconcore
GitHub
GitHub - rasta-mouse/Crystal-Kit: Evasion kit for Cobalt Strike
Evasion kit for Cobalt Strike. Contribute to rasta-mouse/Crystal-Kit development by creating an account on GitHub.
DecryptRecoveryLAPS_RPC
OverLAPS
#ad #laps #poc @reconcore
A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.
OverLAPS
Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"
#ad #laps #poc @reconcore
Cobalt Strike License 4.11.1 & Arsenal Kit
β Persistence Arsenal Kit
β Malleable Profile
β Module Stomping
β Shellcode Loader .cna for integration
β Asynchronous BOFs
β Out-of-the-Box Evasion Overhaul
β VNC and Other useful tools and scripts
This media is not supported in your browser
VIEW IN TELEGRAM
CobaltStrike-Linux-Beacon
#poc #beacon #linux @reconcore
Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons
#poc #beacon #linux @reconcore
β€1
This media is not supported in your browser
VIEW IN TELEGRAM
Eden
FORTRA: Playing in the (Tradecraft) Garden of Beacon: Finding Eden
#bof #poc #pic #technique @reconcore
UDRL loader for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (currently a PIC version of the Sleepmask-VS Draugr callgate BOF).
FORTRA: Playing in the (Tradecraft) Garden of Beacon: Finding Eden
#bof #poc #pic #technique @reconcore
β€2
Source Code Botnet Hook
β Grabbers and Stealers:
All bugs squashed and optimization cranked up for smoother operation.
β Builder & ObfuscaAPK:
APK builds now use domains instead of IPs. IP flip? Just point the domain β no client drop-offs!
β VNC & TCP Tunneling:
Compatibility patched, plus a fresh tunneling method for lightning-fast performance.
β Device Compatibility:
Locked in support for Chinese handsets and the latest Android 15, 16
β Client Panel Fixes:
No more random disconnects β sessions stay rock-solid.
β Anti-Uninstallation:
Beefed-up defenses to keep your payloads glued in place.
β Bonus Tweaks:
A slew of under-the-hood enhancements for that extra edge.
Rustbof
#bof #coff #beacon #rust @reconcore
This project enables the development of BOFs using Rust with full no_stdsupport. It leverages Rust's safety features and modern tooling while producing small, efficient COFF objects.
The framework provides everything needed for BOF development. The build process compiles your code to a static library, which boflink then links into a COFF object with proper relocations and imports for Beacon's dynamic function resolution.
#bof #coff #beacon #rust @reconcore
CVE-2026-1357
#cve #rce #poc @reconcore
WPvivid Backup & Migration β€ 0.9.123 Unauthenticated RCE PoC (Cryptographic Fail-Open + Path Traversal)
#cve #rce #poc @reconcore
GitHub
GitHub - halilkirazkaya/CVE-2026-1357: CVE-2026-1357 β WPvivid Backup & Migration β€ 0.9.123 Unauthenticated RCE PoC (Cryptographicβ¦
CVE-2026-1357 β WPvivid Backup & Migration β€ 0.9.123 Unauthenticated RCE PoC (Cryptographic Fail-Open + Path Traversal) - halilkirazkaya/CVE-2026-1357
Living off the Process
CodefromBlog
#technique #shellcode #asm @reconcore
This is a technique that does as the name implies: We use what is already available to us in the remote process of our choosing to accomplish a given goal. In this case, the goal will be to write shellcode indirectly into the remote process with as low of a footprint as possible. When I say indirectly, I mean we wonβt be using WriteProcessMemory to write the shellcode. That API does play a small role, but ultimately we will be indirectly writing our shellcode in 8 byte chunks using ROP gadgets and assembly stubs all made available in the remote process. We will also avoid the creation of RWX regions of memory.
CodefromBlog
#technique #shellcode #asm @reconcore
π€―1π1
Media is too big
VIEW IN TELEGRAM
Zero Day Ransomware vs Popular Antivirus and EDR
#raas #ransomware #zeroday #malware #av #edr @reconcore
#raas #ransomware #zeroday #malware #av #edr @reconcore
π2
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2026-21508 - Windows Local Privilege Escalation via arbitrary COM object initialization
CVE-2026-21508_PoC
#vulnerability #research #windows #cve #poc #eop @reconcore
This vulnerability essentially works by forcing a process running as system and that uses the undocumented function Windows_Storage!_SHCoCreateInstance, to create an arbitrary COM object of our choice. For this to happen, the object must be associated with an already registered COM class that supports CLSCTX_INPROC_SERVER. Arbitrary COM object creation is archived by manipulating a CoCreateInstance call first argument
CVE-2026-21508_PoC
#vulnerability #research #windows #cve #poc #eop @reconcore
β€1π1