Forwarded from encrypted.
White Matter. Part 1. You Are (Not) Alone.pdf
904.1 KB
Также небольшое пояснение к коду.
👾4
Cross-Session DCOM-Relay attack
Relaying Potatoes: Another Unexpected Privilege Escalation Vulnerability in Windows RPC Protocol
BlueHat IL 2022 - Antonio Cocomazzi & Andrea Pierini - Relaying to Greatness
Windows Exploitation Tricks: Relaying DCOM Authentication by jams forshaw
HTB machine to see how it is in real example:
https://www.0xfr3nzy.com/posts/htb-shibuya-windows-hard/
#HTB
Relaying Potatoes: Another Unexpected Privilege Escalation Vulnerability in Windows RPC Protocol
BlueHat IL 2022 - Antonio Cocomazzi & Andrea Pierini - Relaying to Greatness
Windows Exploitation Tricks: Relaying DCOM Authentication by jams forshaw
HTB machine to see how it is in real example:
https://www.0xfr3nzy.com/posts/htb-shibuya-windows-hard/
#HTB
👾3
Chasing the Silver Fox: https://research.checkpoint.com/2025/silver-fox-apt-vulnerable-drivers
Vuln_ #driver
Vuln_ #driver
👾5
VAC-Module-Dumper
Aspasia - Counter-Strike 2 Reverse Engineering Framework
#gh #csgo
Ever Wondered how an anti-cheat system is actually loaded into memory?
Aspasia - Counter-Strike 2 Reverse Engineering Framework
#gh #csgo
👾7
https://g3tsyst3m.github.io/uac%20bypass/Bypass-UAC-via-Intel-ShaderCache/
https://cicada-8.medium.com/were-going-the-wrong-way-how-to-abuse-symlinks-and-get-lpe-in-windows-0c598b99125b
https://specterops.io/blog/2025/06/18/administrator-protection/
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
#uac
https://cicada-8.medium.com/were-going-the-wrong-way-how-to-abuse-symlinks-and-get-lpe-in-windows-0c598b99125b
https://specterops.io/blog/2025/06/18/administrator-protection/
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
#uac
👾2
DotnetNoVirtualProtectShellcodeLoader
load shellcode without P/D Invoke and VirtualProtect call.
How
This code leverages built-in .NET functionality to allocate an RWX memory region and overwrite a C# method with your own shellcode using the RuntimeHelpers.PrepareMethod(handle) method.
https://github.com/Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader
load shellcode without P/D Invoke and VirtualProtect call.
How
This code leverages built-in .NET functionality to allocate an RWX memory region and overwrite a C# method with your own shellcode using the RuntimeHelpers.PrepareMethod(handle) method.
https://github.com/Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader
👾2
Forwarded from GangExposed
This media is not supported in your browser
VIEW IN TELEGRAM
The video shows 11 members of the Conti ransomware gang.
Dubai, UAE, February 2022
#GangExposed #Conti #Ransomware
Dubai, UAE, February 2022
#GangExposed #Conti #Ransomware
👾11
1. ThreadStackSpoofer by mgeeky
- [ThreadStackSpoofer GitHub Repository]
2. CallStackSpoofer by WithSecureLabs
- [CallStackSpoofer GitHub Repository]
3. Draugr by NtDallas
- [Draugr GitHub Repository]
4. LoudSunRun by susMdT
- [LoudSunRun GitHub Repository]
5. BokuLoader by boku7
- [BokuLoader GitHub Repository]
https://dtsec.us/2023-09-15-StackSpoofin/
#Loader #callstack
Overview: This tool demonstrates an advanced in-memory evasion technique that spoofs the thread call stack. It's designed to bypass thread-based memory examination rules, making it harder for analysts to detect injected shellcode within process memory.
- [ThreadStackSpoofer GitHub Repository]
2. CallStackSpoofer by WithSecureLabs
Overview: This proof-of-concept implementation demonstrates how to spoof arbitrary call stacks during system calls, such as NtOpenProcess. It's a more advanced technique that builds upon the concepts introduced in ThreadStackSpoofer.- [CallStackSpoofer GitHub Repository]
3. Draugr by NtDallas
Overview: Draugr is a Cobalt Strike Beacon
Object File (BOF) template that facilitates the creation of synthetic stack frames, effectively spoofing the call stack during execution. It utilizes gadgets fromKERNELBASE.DLLto achieve this
- [Draugr GitHub Repository]
4. LoudSunRun by susMdT
Overview: LoudSunRun is a technique that involves stack spoofing with synthetic frames. It calculates the total stack size of fake frames and adjusts stack arguments accordingly to obscure the true execution path.
- [LoudSunRun GitHub Repository]
5. BokuLoader by boku7
Overview: BokuLoader is a proof-of-concept Cobalt Strike Reflective Loader that aims to recreate, integrate, and enhance Cobalt Strike's evasion features. It combines various evasion techniques, including call stack spoofing, to achieve stealthy execution.
- [BokuLoader GitHub Repository]
https://dtsec.us/2023-09-15-StackSpoofin/
#Loader #callstack
👾4
Dissect_DCOM_1.pdf
3.1 MB
"Dissecting DCOM"
This article aims at giving an introduction to the base principles of COM and DCOM protocols as well as a detailed network analysis of DCOM
See also:
DCOM Lateral movement PoC
Lateral Movement Using DCOM and DLL Hijacking
👾5
👾1