reconcore
1.93K subscribers
1.16K photos
164 videos
298 files
2.5K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
🛠 Adventures in Shellcode Obfuscation

This series of articles explores various methods for hiding shellcode, emphasizing techniques to avoid detection. The focus is on demonstrating diverse approaches to conceal shellcode.

🔗 Part 1: Overview
🔗 Part 2: Hail Caesar
🔗 Part 3: Encryption
🔗 Part 4: RC4 with a Twist
🔗 Part 5: Base64
🔗 Part 6: Two Array Method

#shellcode #obfuscation #clang #maldev
🖥 Find and execute WinAPI functions with Assembly

If you want to take a happy little journey through PEB structs, PE headers and kernel32.dll Export Table to spawn some "calc.exe" on x64 using Assembly, here it is.

📚 What you will learn:

— WinAPI function manual location with Assembly;
— PEB Structure and PEB_LDR_DATA;
— PE File Structure;
— Relative Virtual Address calculation;
— Export Address Table (EAT);
— Windows x64 calling-convention in practice;
— Writing in Assembly like a real Giga-Chad...

🔗 Source:
https://print3m.github.io/blog/x64-winapi-shellcoding

#maldev #winapi #x64 #shellcode #assembly
Please open Telegram to view this post
VIEW IN TELEGRAM
👎2
The Anti-EDR Compendium
EDR functionality and bypasses in 2024, with focus on undetected shellcode loader.

#edr #shellcode #loader #bypass @reconcore
👍1
Ghost: Shellcode Loader

Ghost is a shellcode loader project designed to bypass multiple detection capabilities that are usually implemented by an EDR.
Feature:
— Bypassing kernel callbacks with fiber threads
— Stack spoofing (Return Address Spoofing and Function Hooking)
— Hiding shellcode within large, randomized memory regions
— Disabling ETW
— Removing EDR function hooks with suspended processes
— Custom API hashing for resolving functions

#edr #shellcode #loader #kernel #memory #evasion @reconcore
👍1
AlphabeticalPolyShellGen
Generates and executes a polymorphic shellcode variant of a specified shellcode file.
#shellcode
DotnetNoVirtualProtectShellcodeLoader
load shellcode without P/D Invoke and VirtualProtect call.

How
This code leverages built-in .NET functionality to allocate an RWX memory region and overwrite a C# method with your own shellcode using the RuntimeHelpers.PrepareMethod(handle) method.
#github #shellcode #loader #methods @reconcore
Invoke-SPSI - Simple PowerShell Shellcode Injector
Basic PowerShell script that decrypts an XOR-encrypted payload in memory, then uses a .NET-based D/Invoke implementation to call Win32 APIs for injecting shellcode into a remote process.
#github #tools #shellcode #payload #powershell #injector @reconcore
Linux hacking part 9: Linux password-protected reverse shell. Simple NASM example
#assembly #linux #malware #redteam #shellcode #blueteam #purpleteam @reconcore
AMSI-Bypass-via-Page-Guard-Exceptions
Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions

Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
1
实战 | 通过VEH异常处理规避内存扫描实现免杀


我之前有个误区是以为睡眠规避必须用套件或者改beacon.c,结果发现hooksleep就行。如果需要远程注入其他进程的话可以注入一个带hook功能的完整pe进去再在里面加载C2的shellcode.

不过私有内存不断被virtualprotect修改也比较可疑,所以不如把shellcode拆开写在image的代码洞里面,那这样甚至不用睡眠混淆了

学习笔记-hooksleep-2023年11月28日
#c2 #beacon #shellcode @reconcore
🎉1
2Pack Rust Based PE & Shellcode Packer
2Pack is a simple packing tool designed for malware hobbyists. It supports both PE files (EXE/DLL) and raw shellcode. The tool employs multiple layers of protection including AES encryption, XOR obfuscation, and compression before embedding payloads in the .rsrc sections of template loaders.

#pe #malware #shellcode @reconcore
1
Living off the Process
This is a technique that does as the name implies: We use what is already available to us in the remote process of our choosing to accomplish a given goal. In this case, the goal will be to write shellcode indirectly into the remote process with as low of a footprint as possible. When I say indirectly, I mean we won’t be using WriteProcessMemory to write the shellcode. That API does play a small role, but ultimately we will be indirectly writing our shellcode in 8 byte chunks using ROP gadgets and assembly stubs all made available in the remote process. We will also avoid the creation of RWX regions of memory.

CodefromBlog
#technique #shellcode #asm @reconcore
🤯1🎉1