Projects
What would you like to read:
📄️ Shellcode
In this blog we will learn how to write a position independent C code. Writing shellcode traditionally meant battling with raw assembly and dealing with massive, unreadable byte arrays. But as we know how Windows Portable Executable (PE) format works, you can write fully functional shellcode in C, compile it directly into our binary, and extract it at runtime. This method is used in my project YetAnotherReflectiveLoader and documented at Reflective DLL Injection, you can watch it in action there.
📄️ Suicide By Micro-Stub
Imagine you have successfully injected a payload into a remote process. Your code executes, does its job perfectly, and now it's time to pack up and leave. But we like to do things stealthily, to maintain OPSEC and avoid leaving Indicators of Compromise like a massive chunk of unbacked PAGEEXECUTEREADWRITE memory sitting around. The logical step is to have our payload free its own memory. In this blog we will see how to pull the rug underneath our legs without tripping over.
📄️ Debugger Evasion
Debugger Evasion
📄️ Network Library
coming soon
