12.8K subscribers
550 photos
27 videos
24 files
890 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
Divide and Rule — AMSI Bypass

By spliiting well known PowerShell scripts, e.g. an AMSI Bypass, we can directly bypass Windows Defender or get at least the line, where the detection occurs. Outcome: Several AMSI Bypasses and two scripts:

- One to split PowerShell snippets in multiple lines
- A second script to run all the files in an Oneliner, XOR obfuscated

https://badoption.eu/blog/2023/07/15/divideconqer.html

#amsi #av #bypass #powershell
7👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🔨KRBUACBypass

By adding a KERB-AD-RESTRICTION-ENTRY to the service ticket, but filling in a fake MachineID, we can easily bypass UAC and gain SYSTEM privileges.

Research:
https://www.tiraniddo.dev/2022/03/bypassing-uac-in-most-complex-way.html

Source:
https://github.com/wh0amitz/KRBUACBypass

#ad #kerberos #uac #bypass
👍7
Forwarded from Похек (Sergey Zybnev)
Please open Telegram to view this post
VIEW IN TELEGRAM
👍122
This media is not supported in your browser
VIEW IN TELEGRAM
🖼️ Bypass Medium Paywall

A little lifehack if you, like me, come across paid articles from Medium. These sites allow you to read paid Medium articles for free:

🔗 https://freedium.cfd/<URL>
🔗 https://medium-forall.vercel.app/
🔗 https://readmedium.com/<URL>

#medium #premium #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥17👍7❤‍🔥5
🖥 Hide Cobalt-Strike like a PRO

The article outlines methods to conceal Cobalt Strike from detection by antivirus and EDR systems, with a particular focus on bypassing Kaspersky Endpoint Security. Author introduces the HCS tool for obfuscating JARM signatures and offers detailed steps for modifying Cobalt Strike’s code and SSL certificates to enhance OPSEC.

🔗 https://blog.injectexp.dev/2024/02/27/hide-cobalt-strike-like-a-pro/

#cobaltstrike #customize #kaspersky #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
👍180🔥213
🖥 Veeam Enterprise Manager Authentication Bypass

May 21st, Veeam published an advisory stating that all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 is affected by an authentication bypass allowing an unauthenticated attacker to bypass the authentication and log in to the Veeam Backup Enterprise Manager web interface as any user the CVSS for this vulnerability is 9.8.

🔗 Source:
https://summoning.team/blog/veeam-enterprise-manager-cve-2024-29849-auth-bypass/

🔗 PoC:
https://github.com/sinsinology/CVE-2024-29849

#veeam #authentication #bypass #cve
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7👍2
This media is not supported in your browser
VIEW IN TELEGRAM
💻 TREVORproxy

This is a simple SOCKS proxy that helps avoid Smart Lockout by load-balancing your requests between multiple IP addresses. It accomplishes this with built-in Linux features -- no complex OpenVPN setups or strange firewall configurations.
There are two techniques that TREVORproxy can use to spread your requests across multiple IP addresses: an SSH Proxy and a Subnet Proxy.

SSH Proxy
You give TREVORproxy some hosts that support SSH, and it sends your traffic through them, making sure to balance equally between all the hosts.

Subnet Proxy
If you have access to a /64 IPv6 subnet (Linode is perfect for this), TREVORproxy will load-balance your requests across eighteen quintillion (18,446,744,073,709,551,616) unique source addresses.

🔗 Source:
https://github.com/blacklanternsecurity/TREVORproxy

#ip #ssh #rotation #waf #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥12👍2👎21
🪞 Smoke and Mirrors — Driver Signatures Are Optional

ItsNotASecurityBoundary is an exploit that leverages False File Immutability assumptions in Windows Code Integrity (ci.dll) to trick it into accepting an improperly-signed security catalog containing fraudulent authentihashes. With attacker-controlled authentihashes loaded and trusted by CI, the kernel will load any driver of the attacker's choosing, even unsigned ones.

🔗 https://github.com/gabriellandau/ItsNotASecurityBoundary

#driver #signature #bypass #ffi #windows
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7
This media is not supported in your browser
VIEW IN TELEGRAM
📄 Evading ETW Based Detections

In this post, Event Tracing for Windows (ETW) will be explored along with various evasion techniques used to evade detections based on this Windows event tracking and collection mechanism.

🔗 https://s4dbrd.com/evading-etw-based-detections/

#etw #bypass #windows
👍52
🔑 Dumping LSA: a story about task decorrelation

Discover the art of bypassing EDRs by decorrelating attack tool behavior. This post explains the process of remote LSA secrets dumping and reveals techniques to retrieve a Windows computer's BOOTKEY without EDR detection.

🔗 Source:
https://sensepost.com/blog/2024/dumping-lsa-secrets-a-story-about-task-decorrelation/

#lsa #sam #dump #edr #bypass
👍122
🛠 PsExeSVC - Remote Execution via Python

PsExeSVC is a Python-based tool that interacts with the PsExec service to execute remote commands without relying on Windows binaries. It enables privilege escalation, remote shell access, and user authentication via primary tokens, mimicking legitimate PsExec.exe behavior while bypassing security controls like EDR detection.

🔗 Research:
https://sensepost.com/blog/2025/psexecing-the-right-way-and-why-zero-trust-is-mandatory/

🔗 Source:
https://github.com/sensepost/susinternals

#windows #ad #psexec #edr #bypass
👍7🔥42
🔑 lsassStealer

lsassStealer is a tool designed to dump the memory of the Windows process "lsass.exe". The dump is performed entirely in RAM, then compressed using the zlib library and fragmented for transmission via UDP packets disguised as NTP packets. This method helps reduce detection by security solutions such as Windows Defender and advanced Endpoint Detection and Response (EDR) tools.

🔗 Source:
https://github.com/Aur3ns/lsassStealer

#windows #lsass #edr #bypass
1🔥18🤯4👍31
🛡CreateProcessAsPPL

This is a utility for running processes with Protected Process Light (PPL) protection, enabling bypass of EDR/AV solution defensive mechanisms. It leverages legitimate Windows clipup.exe functionality from System32 to create protected processes that can overwrite antivirus service executable files.

🔗 Source:
https://github.com/2x7EQ13/CreateProcessAsPPL

🔗 Research:
https://www.zerosalarium.com/2025/08/countering-edrs-with-backing-of-ppl-protection.html

#av #edr #bypass #ppl
1👍105