Twitter | Search | |
Search Refresh
root@alex:~# Dec 7
I finished the AES PowerShell module for , but I feel like I'm releasing these too fast. I'm going to build some more and release a bit slower. :)
Reply Retweet Like
Jayme Jun 21
Redteam folks: looking for any resources on cobalt strike scripting, beyond the basics Mudge has on the website. Talks, tutorials, whitepapers, examples all welcome.
Reply Retweet Like
x0rz Oct 24
DNS over HTTPS (DoH) C2 (command and control) for Cobalt Strike
Reply Retweet Like
Ring3API Apr 21
– Bypassing Windows with Obfuscation –
Reply Retweet Like
Bishop Fox Jun 15
Happy to share that the Sliver framework is live at our right now - if you were intrigued by this alternative, check it out:
Reply Retweet Like
Christopher Cottrell | OSCP | GXPN Mar 18
Happy to push out my next Aggressor script for Cobalt Strike, a process argument spoofing generator.: deckbuilder.cna
Reply Retweet Like
Konrāds Klints 17 Feb 18
Who said hacking can't hip? :D
Reply Retweet Like
Mike Felch 21 Nov 17
Rubik's cubing while waiting on shells from a new technique..
Reply Retweet Like
HackRead.com Jan 26
Reply Retweet Like
Florian Roth Apr 20
Isn't it funny that more and more threat groups rely on tools built for red teaming / penetration testing, which is intended to simulate threat group activity
Reply Retweet Like
invictus Mar 13
Managed to get external C2 working over slack, implemented in C++ because I hate myself
Reply Retweet Like
Pathocode Jan 15
As a , we need to be one step ahead of the blue team. Therefore, our attacks must be more sophisticated in order keep up with the game. Using , to compromise endpoints.
Reply Retweet Like
Ring3API May 22
- Get Text Messages for your Incoming Beacons - FortyNorth Security
Reply Retweet Like
ReadMoreBooks() Jul 11
Reply Retweet Like
Arris Huijgen Nov 28
is a tool implemented in C# which supports executing PowerShell-like commands while remaining invisible to any PowerShell logging mechanisms. This .NET v2 compatible binary can be loaded in to execute commands in-memory.
Reply Retweet Like
Steven Jul 25
Latest blog post on a couple of new items. SharpView - A C# implementation of and a aggressor script for version 3 and
Reply Retweet Like
Pathocode Jan 17
Not a silver bullet, but it is possible to weaponize vulnerability with Office Document. PoC.
Reply Retweet Like
root@alex:~# Dec 6
Another Update for the Script. Next up is AES Powershell.
Reply Retweet Like
root@alex:~# Nov 29
As promised I plan to add more payloads. I would love some ideas!
Reply Retweet Like
Ahmed Sonbol 25 Sep 17
New blog: exploits CVE-2017-8759 to deliver payload
Reply Retweet Like