Mapping-Injection Another Windows Process Injection
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
Penetration Testing Tools, ML and Linux Tutorials
Mapping-Injection Another Windows Process Injection - Penetration Testing Tools, ML and Linux Tutorials
Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory.
RdpThief – Extracting Clear Text Passwords from mstsc.exe using API Hooking
#RdpThief #APIHooking #CobaltStrike #shellcode #CyberSecurity #hooking
https://upurl.me/yq27u
#RdpThief #APIHooking #CobaltStrike #shellcode #CyberSecurity #hooking
https://upurl.me/yq27u
Write Windows Shellcode in Rust
#Shellcode #Rust #WindowsShellcode #InfoSec #CyberSecurity
https://reconshell.com/write-windows-shellcode-in-rust/
#Shellcode #Rust #WindowsShellcode #InfoSec #CyberSecurity
https://reconshell.com/write-windows-shellcode-in-rust/
Penetration Testing Tools, ML and Linux Tutorials
Write Windows Shellcode in Rust - Penetration Testing Tools, ML and Linux Tutorials
Windows shellcode project is located in shellcode/, it can build into a PE file with only .text section and has no external dependencies.
OffensivePH - Post Exploitation Tool
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
BadOutlook - Malicious Outlook Reader
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
Penetration Testing Tools, ML and Linux Tutorials
BadOutlook - Malicious Outlook Reader - Penetration Testing Tools, ML and Linux Tutorials
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a specific trigger subject line.
charlotte – fully undetected shellcode launcher
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass
DNSStager - Hide your payload in DNS
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
Penetration Testing Tools, ML and Linux Tutorials
DNSStager - Hide your payload in DNS - Penetration Testing Tools, ML and Linux Tutorials
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
EarlyBird - injecting cobalt strike shellcode to powershell
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
Penetration Testing Tools, ML and Linux Tutorials
EarlyBird - injecting cobalt strike shellcode to powershell - Penetration Testing Tools, ML and Linux Tutorials
EarlyBird: a poc of using the tech with syscalls on powershell.exe injecting cobalt strike shellcode to powershell.exe using EarlyBird Tech USAGE: first get
CobaltStrike BOF - Inject ETW Bypass
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
Penetration Testing Tools, ML and Linux Tutorials
CobaltStrike BOF - Inject ETW Bypass - Penetration Testing Tools, ML and Linux Tutorials
Running InjectEtwBypass BOF from CobaltStrike to Bypass ETW in Notepad.exe
CopyCat - Simple rapper for Mimikatz bypass Defender
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
Penetration Testing Tools, ML and Linux Tutorials
CopyCat - Simple rapper for Mimikatz bypass Defender - Penetration Testing Tools, ML and Linux Tutorials
Start a cmd shell (with admin priv.) like this and run CopyCat.exe and enjoy Mimikatz (If you are running 64 bit Windows 10)
EXOCET - AV-evading undetectable payload delivery tool
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
Penetration Testing Tools, ML and Linux Tutorials
EXOCET - AV-evading undetectable payload delivery tool - Penetration Testing Tools, ML and Linux Tutorials
EXOCET is superior to Metasploit's "Evasive Payloads" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a
OffensiveRust - Rust Weaponization for Red Team Engagements
#Rust #OffensiveRust #RedTeam #ProcessInjection
#OPSEC #Shellcode #Enumeration #ReverseShell
https://reconshell.com/offensiverust-rust-weaponization-for-red-team-engagements/
#Rust #OffensiveRust #RedTeam #ProcessInjection
#OPSEC #Shellcode #Enumeration #ReverseShell
https://reconshell.com/offensiverust-rust-weaponization-for-red-team-engagements/
Penetration Testing Tools, ML and Linux Tutorials
OffensiveRust - Rust Weaponization for Red Team Engagements - Penetration Testing Tools, ML and Linux Tutorials
My experiments in weaponizing Rust for implant development and general offensive operations.
SourcePoint - polymorphic C2 profile generator for Cobalt Strike
#C2 #shellcode #PostExploitation #Keylogger #CobaltStrike #Malware
https://reconshell.com/sourcepoint-polymorphic-c2-profile-generator-for-cobalt-strike/
#C2 #shellcode #PostExploitation #Keylogger #CobaltStrike #Malware
https://reconshell.com/sourcepoint-polymorphic-c2-profile-generator-for-cobalt-strike/
Penetration Testing Tools, ML and Linux Tutorials
SourcePoint - polymorphic C2 profile generator for Cobalt Strike - Penetration Testing Tools, ML and Linux Tutorials
SourcePoint is a polymorphic C2 profile generator for Cobalt Strike C2s, written in Go. SourcePoint allows unique C2 profiles to be generated on the fly that
Shellcode Injection Techniques
#Meterpreter #payload #Hijacking #Hacking
#Injection #Shellcode
https://reconshell.com/shellcode-injection-techniques/
#Meterpreter #payload #Hijacking #Hacking
#Injection #Shellcode
https://reconshell.com/shellcode-injection-techniques/
Penetration Testing Tools, ML and Linux Tutorials
Shellcode Injection Techniques - Penetration Testing Tools, ML and Linux Tutorials
A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload.
Cross Platform C2
#Medusa #C2 #Malware #SOCKS5 #shellcode #RAT
https://reconshell.com/medusa-cross-platform-c2/
#Medusa #C2 #Malware #SOCKS5 #shellcode #RAT
https://reconshell.com/medusa-cross-platform-c2/
Penetration Testing Tools, ML and Linux Tutorials
Medusa - Cross Platform C2 - Penetration Testing Tools, ML and Linux Tutorials
To install Medusa, you'll need Mythic installed on a remote computer. You can find installation instructions for Mythic at the Mythic project page.
Windows Exploitation Resources
#Exploitation #Windows #Microsoft #Shellcode #Rootkits
#zeroday #KernelExploit #Vulnerability #CVE #Pwn2Own
#AttackSurface #Hacking #Bugbounty #Fuzzing #BlackHat
https://reconshell.com/windows-exploitation-resources/
#Exploitation #Windows #Microsoft #Shellcode #Rootkits
#zeroday #KernelExploit #Vulnerability #CVE #Pwn2Own
#AttackSurface #Hacking #Bugbounty #Fuzzing #BlackHat
https://reconshell.com/windows-exploitation-resources/
Penetration Testing Tools, ML and Linux Tutorials
Windows Exploitation Resources - Penetration Testing Tools, ML and Linux Tutorials
The Exploitation Resources is a github repository by FULLSHADE
Meterpreter Injection Technique
#BugBounty #Defender #Exploit #Hacking #Injection
#Malware #Meterpreter #Payload #Shellcode #Virus
#CyberSecurity #APT #Thread #OSINT #Pentesting
https://reconshell.com/meterpreter-injection-technique/
#BugBounty #Defender #Exploit #Hacking #Injection
#Malware #Meterpreter #Payload #Shellcode #Virus
#CyberSecurity #APT #Thread #OSINT #Pentesting
https://reconshell.com/meterpreter-injection-technique/
Penetration Testing Tools, ML and Linux Tutorials
Meterpreter Injection Technique - Penetration Testing Tools, ML and Linux Tutorials
Another meterpreter injection technique using C# that attempts to bypass WD.
Modern and Malleable Post Exploitation Framework
#CobaltStrike #C2 #Malware #Payload #Exploit #VAPT
#PostExploitation #Vulnerability #shellcode #Cyber
#Hacking #APT #Infosec #Appsec #Pentest #Security
https://reconshell.com/modern-and-malleable-post-exploitation-framework/
#CobaltStrike #C2 #Malware #Payload #Exploit #VAPT
#PostExploitation #Vulnerability #shellcode #Cyber
#Hacking #APT #Infosec #Appsec #Pentest #Security
https://reconshell.com/modern-and-malleable-post-exploitation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Modern and Malleable Post Exploitation Framework - Penetration Testing Tools, ML and Linux Tutorials
Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider.