Source Byte
7.79K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory
GitHub
Link
Blog


#malware_dev
54🥱2👍1
DarkPulse is a shellcode packer written in Go. It is used to generate various shellcode loaders.

https://github.com/fdx-xdf/darkPulse

#malware_dev
32
GoThief
Recently, I encountered such a scenario in an attack and defense game. The target machine accessed the internal application system and was uniformly controlled by VPN. After connecting to VPN, the connection with the external network would be disconnected, resulting in the inability to issue commands in real time. Therefore, I had the idea of developing this small tool. By taking screenshots of the keyboard and recording the clipboard, I could obtain the target's operations after connecting to VPN, and collect sensitive information for the next step of lateral movement.

GitHub

#stealer #malware_dev
4🔥2👍1
Check out the full source code of EagleSpy and tailor it to your preferences.

#source
#malware_analysis
#malware_dev #malware
👍22🔥1
An Introduction to Bypassing User Mode EDR Hooks
Credit: Marcus Hutchins
Whilst this article is designed to stand on its own, if you’re interested, you can find my previous articles on these topics here, here, here and here. Surprisingly, despite all this research being over a decade old, it’s still completely relevant today. The more things change, the more they stay the same, I guess?
https://malwaretech.com/2023/12/an-introduction-to-bypassing-user-mode-edr-hooks.html


#Hooking #edr
#malware_dev
🔥2👾2
Introduction global hook and its cases
https://www.programmerall.com/article/21622234988/
hook, refers to a technique used to advance the use of api intercept and process windows messages. Such as a keyboard hook, the Trojans have a lot of this stuff, monitor your keyboard.


Related:
[+] GoHook, Go global keyboard and mouse listener hook

[+] Implementing Global Injection and Hooking in Windows



#Hooking
#malware_dev
👾3🗿1
Source Byte
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory GitHub Link Blog #malware_dev
This media is not supported in your browser
VIEW IN TELEGRAM
Bypassing PESieve and Moneta (The "easy" way....?)
It contains several parts.

Implementation of gargoyle
Lockd: This is the main Gargoyle component
sRDI-Master: This has been slightly re worked to provide a free mechanism.
test.profile: This sample profile shows required options to work
ShellcodeRDI.py: This is the altered python generator with the new sRDI assembly

+ Blog
+ GitHub


#malware_dev
👾5👍2
DLHell
DLHell is a tool for performing local and remote DCOM Windows DLL proxying. It can intercept DLLs on remote objects to execute arbitrary commands. The tool supports various authentication methods and provides capabilities for local and remote DLL proxying, as well as DCOM DLL proxying.


https://github.com/synacktiv/DLHell

#malware_dev
4👍1
🤯9😁3👾1
Develop your own RAT - AV & EDR Defense
credit : @dobinrutis

code : A C2 framework and RAT written in Go.

slides : 👇🏻

#go , #golang , #c2 , #malware_dev
🔥5👍1👾1
When the hunter becomes the hunted: Using custom callbacks to disable EDRs
Security software and EDR systems register their process creation callbacks in this array using functions such as PsSetCreateProcessNotifyRoutine, PsSetCreateProcessNotifyRoutineEx, and PsSetCreateProcessNotifyRoutineEx2. Each of these functions allows drivers to add their specific callbacks to the array, enabling them to monitor process creation events effectively.

How can we use that functions?

#edr #malware_dev
🔥31👍1
Evasive Malware

#book #malware_dev
6🔥2👾2🤡1
Research into removing strings & API call references at compile-time (Anti-Analysis)
GitHub

An example in C/C++ of how we can remove static string & function call references by using obfuscation paired with runtime function pointers. As a result, static analysis using tools such as IDA or x64Dbg increases in time/difficulty. You may be able to hide specific API calls from anti-malware systems. On the other hand, some AVs might also flag this behavior as being malicious due to there being a lack of "real looking behavior" in the binary.
#malware_dev #evasion
👍43👾2🔥1
(In)direct Syscalls: A journey from high to low
RedOps | Red Team Village | DEF CON 31

syllabus:
01: Introduction and Abstract
02: Prerequistes
03: Chapter 1 | Windows NT Basics
04: Chapter 2 | Windows OS System Calls
05: Chapter 2 | LAB Exercise Playbook
06: Chapter 3 | Concept of Direct Syscalls
07: Chapter 4 | Win32 APIs
08: Chapter 4 | LAB Exercise Playbook
09: Chapter 5 | Native APIs
10: Chapter 5 | LAB Exercise Playbook
11: Chapter 6 | Direct Syscalls
12: Chapter 6 | LAB Exercise Playbook
13: Chapter 7 | Indirect Syscalls
14: Chapter 7 | LAB Exercise Playbook

All the theory and playbooks for the exercises can be found in the wiki, which together with the prepared POCs is the heart of this project. The POCs for the exercises can be found here on the main page.
https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop.git

#redteam #malware_dev
6👍2👾2
HijackFileHandle -
Hijack a file in a remote process without code injection
In three language 😂

https://web.archive.org/web/20220802125038/https://www.x86matthew.com/view_post?id=hijack_file_handle


[翻译]HijackFileHandle - 在不注入代码的情况下劫持一个远程进程的文件
https://bbs.kanxue.com/thread-271445-1.htm

Взлом дескрипторов в Windows с помощью Handle Hijacking
https://spy-soft.net/handle-hijacking/

#malware_dev
2
The Abuse of Exception Handlers
[ Blog ]

#malware_dev #anti_debug
👍6
Process Injection via Component Object Model (COM) IRundown::DoCallback()
From MDSec

https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/

#malware_dev
3👍3
👍3