gargoyle is a technique for hiding all of a program’s executable code in non-executable memory
GitHub
Link
Blog
#malware_dev
GitHub
Link
Blog
#malware_dev
❤5 4🥱2👍1
DarkPulse is a shellcode packer written in Go. It is used to generate various shellcode loaders.
https://github.com/fdx-xdf/darkPulse
#malware_dev
https://github.com/fdx-xdf/darkPulse
#malware_dev
GoThief
GitHub
#stealer #malware_dev
Recently, I encountered such a scenario in an attack and defense game. The target machine accessed the internal application system and was uniformly controlled by VPN. After connecting to VPN, the connection with the external network would be disconnected, resulting in the inability to issue commands in real time. Therefore, I had the idea of developing this small tool. By taking screenshots of the keyboard and recording the clipboard, I could obtain the target's operations after connecting to VPN, and collect sensitive information for the next step of lateral movement.
GitHub
#stealer #malware_dev
Check out the full source code of EagleSpy and tailor it to your preferences.
#source
#malware_analysis
#malware_dev #malware
#source
#malware_analysis
#malware_dev #malware
👍2 2🔥1
An Introduction to Bypassing User Mode EDR Hooks
Credit: Marcus Hutchins
#Hooking #edr
#malware_dev
Credit: Marcus Hutchins
Whilst this article is designed to stand on its own, if you’re interested, you can find my previous articles on these topics here, here, here and here. Surprisingly, despite all this research being over a decade old, it’s still completely relevant today. The more things change, the more they stay the same, I guess?https://malwaretech.com/2023/12/an-introduction-to-bypassing-user-mode-edr-hooks.html
#Hooking #edr
#malware_dev
🔥2👾2
Introduction global hook and its cases
https://www.programmerall.com/article/21622234988/
Related:
[+] GoHook, Go global keyboard and mouse listener hook
[+] Implementing Global Injection and Hooking in Windows
#Hooking
#malware_dev
https://www.programmerall.com/article/21622234988/
hook, refers to a technique used to advance the use of api intercept and process windows messages. Such as a keyboard hook, the Trojans have a lot of this stuff, monitor your keyboard.
Related:
[+] GoHook, Go global keyboard and mouse listener hook
[+] Implementing Global Injection and Hooking in Windows
#Hooking
#malware_dev
👾3🗿1
Source Byte
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory GitHub Link Blog #malware_dev
This media is not supported in your browser
VIEW IN TELEGRAM
Bypassing PESieve and Moneta (The "easy" way....?)
It contains several parts.
Implementation of gargoyle
+ Blog
+ GitHub
#malware_dev
It contains several parts.
Implementation of gargoyle
Lockd: This is the main Gargoyle component
sRDI-Master: This has been slightly re worked to provide a free mechanism.
test.profile: This sample profile shows required options to work
ShellcodeRDI.py: This is the altered python generator with the new sRDI assembly
+ Blog
+ GitHub
#malware_dev
👾5👍2
DLHell
https://github.com/synacktiv/DLHell
#malware_dev
DLHell is a tool for performing local and remote DCOM Windows DLL proxying. It can intercept DLLs on remote objects to execute arbitrary commands. The tool supports various authentication methods and provides capabilities for local and remote DLL proxying, as well as DCOM DLL proxying.
https://github.com/synacktiv/DLHell
#malware_dev
❤4👍1
What is a "control-flow flattening" obfuscation technique?
https://reverseengineering.stackexchange.com/questions/2221/what-is-a-control-flow-flattening-obfuscation-technique
#malware_dev
https://reverseengineering.stackexchange.com/questions/2221/what-is-a-control-flow-flattening-obfuscation-technique
#malware_dev
🤯9😁3👾1
Develop your own RAT - AV & EDR Defense
credit : @dobinrutis
code : A C2 framework and RAT written in Go.
slides : 👇🏻
#go , #golang , #c2 , #malware_dev
credit : @dobinrutis
code : A C2 framework and RAT written in Go.
slides : 👇🏻
#go , #golang , #c2 , #malware_dev
🔥5👍1👾1
When the hunter becomes the hunted: Using custom callbacks to disable EDRs
How can we use that functions?
#edr #malware_dev
Security software and EDR systems register their process creation callbacks in this array using functions such as PsSetCreateProcessNotifyRoutine, PsSetCreateProcessNotifyRoutineEx, and PsSetCreateProcessNotifyRoutineEx2. Each of these functions allows drivers to add their specific callbacks to the array, enabling them to monitor process creation events effectively.
How can we use that functions?
#edr #malware_dev
🔥3❤1👍1
Research into removing strings & API call references at compile-time (Anti-Analysis)
GitHub
GitHub
An example in C/C++ of how we can remove static string & function call references by using obfuscation paired with runtime function pointers. As a result, static analysis using tools such as IDA or x64Dbg increases in time/difficulty. You may be able to hide specific API calls from anti-malware systems. On the other hand, some AVs might also flag this behavior as being malicious due to there being a lack of "real looking behavior" in the binary.#malware_dev #evasion
👍4❤3👾2🔥1
(In)direct Syscalls: A journey from high to low
syllabus:
All the theory and playbooks for the exercises can be found in the wiki, which together with the prepared POCs is the heart of this project. The POCs for the exercises can be found here on the main page.
https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop.git
#redteam #malware_dev
RedOps | Red Team Village | DEF CON 31
syllabus:
01: Introduction and Abstract
02: Prerequistes
03: Chapter 1 | Windows NT Basics
04: Chapter 2 | Windows OS System Calls
05: Chapter 2 | LAB Exercise Playbook
06: Chapter 3 | Concept of Direct Syscalls
07: Chapter 4 | Win32 APIs
08: Chapter 4 | LAB Exercise Playbook
09: Chapter 5 | Native APIs
10: Chapter 5 | LAB Exercise Playbook
11: Chapter 6 | Direct Syscalls
12: Chapter 6 | LAB Exercise Playbook
13: Chapter 7 | Indirect Syscalls
14: Chapter 7 | LAB Exercise Playbook
All the theory and playbooks for the exercises can be found in the wiki, which together with the prepared POCs is the heart of this project. The POCs for the exercises can be found here on the main page.
https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop.git
#redteam #malware_dev
❤6👍2👾2
HijackFileHandle -
https://web.archive.org/web/20220802125038/https://www.x86matthew.com/view_post?id=hijack_file_handle
[翻译]HijackFileHandle - 在不注入代码的情况下劫持一个远程进程的文件
https://bbs.kanxue.com/thread-271445-1.htm
Взлом дескрипторов в Windows с помощью Handle Hijacking
https://spy-soft.net/handle-hijacking/
#malware_dev
Hijack a file in a remote process without code injection
In three language 😂
https://web.archive.org/web/20220802125038/https://www.x86matthew.com/view_post?id=hijack_file_handle
[翻译]HijackFileHandle - 在不注入代码的情况下劫持一个远程进程的文件
https://bbs.kanxue.com/thread-271445-1.htm
Взлом дескрипторов в Windows с помощью Handle Hijacking
https://spy-soft.net/handle-hijacking/
#malware_dev
❤2
Process Injection via Component Object Model (COM) IRundown::DoCallback()
https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/
#malware_dev
From MDSec
https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/
#malware_dev
❤3👍3
x64 WINAPI Recursive Loader
https://web.archive.org/web/20240928164510/https://github.com/Evi1Grey5/Recursive-Loader
#Loader #malware_dev
"Code provided by smelly - vx-underground"
https://web.archive.org/web/20240928164510/https://github.com/Evi1Grey5/Recursive-Loader
#Loader #malware_dev
👍3
Source Byte
Process Injection via Component Object Model (COM) IRundown::DoCallback() From MDSec https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/ #malware_dev
COM PROCESS INJECTION for RUST
https://github.com/0xlane/com-process-inject.git
#malware_dev
Process Injection via Component Object Model (COM) IRundown::DoCallback().
https://github.com/0xlane/com-process-inject.git
#malware_dev
🔥4