Tutorial: Adaptix C2 with ShellcodePack and MacroPack

#redteam #pentest

Original post by Emeric

The article explains how to integrate the Adaptix C2 framework with BallisKit tools ShellcodePack and MacroPack to create stealthy payloads for red-team operations. Adaptix is an open-source command-and-control platform used for post-exploitation and adversarial emulation. The tutorial walks through setting up an Adaptix server on Linux and compiling the GUI client.

https://core-jmp.org/2026/04/tutorial-adaptix-c2-with-shellcodepack-and-macropack/

Tutorial: Adaptix C2 with ShellcodePack and MacroPack

This tutorial shows how to weaponize Adaptix C2 agents using ShellcodePack and MacroPack, converting payloads into shellcode and packaging them in evasive loaders to improve stealth and bypass EDR during red-team operations.

core-jmp

Dump LSASS via physical memory read primitives in vulnerable kernel drivers

https://github.com/RainbowDynamix/GhostKatz

#infosec #cybersecurity #redteam #pentest

GitHub - RainbowDynamix/GhostKatz: Dump LSASS via physical memory read primitives in vulnerable kernel drivers

Dump LSASS via physical memory read primitives in vulnerable kernel drivers - RainbowDynamix/GhostKatz

GitHub

Been working on something for a while and finally put it out there, a public security challenge against a threshold cryptography system I built for my own infrastructure.

Four servers, four countries, four hosting providers. The group signing key was generated distributedly (Pedersen DKG), no single server holds the full secret. I literally can't extract it myself. The challenge is to forge a valid FROST Ed25519 signature against today's published challenge string.

What makes it different from a typical CTF:

→ It's not a weekend event. It runs 24/7 for 90 days. The servers are real production boxes running real software (Nextcloud, Gitea, a team API, Grafana). Not docker containers with planted vulns.

→ Post-quantum hybrid. The audit chain carries ML-DSA-44 signatures alongside the FROST threshold sigs, with a downgrade-detection flag baked into the signed payload. Stripping the PQ signature invalidates the classical one.

→ There's a spiking neural network watching the cluster. 258 neurons with STDP learning and four neuromodulators (dopamine, noradrenaline, acetylcholine, serotonin). It processes DAG events, network metrics, and system telemetry as spike trains. A local LLM reads the brain's internal state every five minutes and reports what it observes. Currently it says the cluster is calm. I want to see what it says when someone's actually poking around.

The detection layer is consensus-based. Cross-peer Merkle verification, honey ports, file canaries, DNS sentinels — but quarantine requires multiple observers to agree before acting. One node can't panic the cluster on its own.

I've already broken it myself twice during deployment. Rolled a binary update and got cascade-quarantined by my own Merkle checker. Tripped a file canary rotating honeypot credentials. Those incidents are published. The system catches real mistakes.

Five tiers from foothold to crown jewel. No cash bounty, just your name on the board, CVE attribution, and write-up rights. Safe harbour under disclose.io terms.

https://hyveguard.com

#infosec #security #cryptography #thresholdcrypto #ctf #FROST #postquantum #pentest #redteam #hacking #spikingneuralnetwork #neuromorphic

@eff @mttaggart @GossiTheDog @briankrebs @lcamtuf

HyveGuard — break the threshold

A guy with no engineering background and an AI built a server-mesh defence system. Bifrost is open. Come break it.

When Windows Defender realizes that a malicious file has a cloud tag it rewrites the file to it's original location. The PoC abuses this behaviour to overwrite system files and gain administrative privileges.

https://github.com/Nightmare-Eclipse/RedSun

#infosec #cybersecurity #pentest #windows

GitHub - Nightmare-Eclipse/RedSun: The Red Sun vulnerability repository

The Red Sun vulnerability repository. Contribute to Nightmare-Eclipse/RedSun development by creating an account on GitHub.

GitHub

Системной подход к сдаче OSWE в 2025

Offensive Security Web Expert ( OSWE ) – продвинутая сертификация offsec по безопасности WEB приложений. Причем ключевым отличием от менее известного Offensive Security Web Assessor ( OSWA ) является упор на анализ исходного кода приложения, то есть поиск уязвимостей в формате «белого» ящика. Окончательное решение сдавать этот экз я принял на бизнес съезде в Турции, когда познакомился с предпринимателем, который проходил ironman (ссылка) дважды. Мой поздний достигатель сразу загорелся идеей о стремительной подготовке. Однако товарищ председатель кооператива задал мне закономерный вопрос: «А OSWE сдать ты не хочешь?». 9 апреля 2025 года, в своём телеграм-канале PathSecure я опубликовал новость о приобретении курса :)

https://habr.com/ru/articles/1024100/

#pentest #offsec #oswe #web #security #education

Системной подход к сдаче OSWE в 2025

Введение Offensive Security Web Expert ( OSWE ) – продвинутая сертификация offsec по безопасности WEB приложений. Причем ключевым отличием от менее известного Offensive Security Web Assessor ( OSWA )...

Хабр

Fritter is a heavily modified fork of TheWover and Odzhan's Donut shellcode generator. It generates position-independent shellcode for in-memory execution of VBScript, JScript, EXE, DLL, and .NET assemblies, but with a heavy focus on evasion and signature resistance.

https://github.com/0xROOTPLS/Fritter

#infosec #cybersecurity #redteam #pentest

GitHub - 0xROOTPLS/Fritter

Contribute to 0xROOTPLS/Fritter development by creating an account on GitHub.

GitHub

Callback Injection: Техника, которая отправила Microsoft Defender в глухой нокаут

Представьте ситуацию: У вас пентест, у вас есть шеллкод, но Windows Defender блокирует любой подозрительный вызов. CreateRemoteThread - детектится. QueueUserAPC - детектится. NtCreateThreadEx - детектится. Что делать? Ответ: не создавать потоки самому, а попросить Windows сделать это за вас!. Callback Injection - это техника, при которой вы «одалживаете» легитимный поток Windows, заставляя его выполнить ваш код через официальные callback-механизмы.

https://habr.com/ru/articles/1023818/

#Defender #windows_defender #pentest #hacking

Callback Injection: Техника, которая отправила Microsoft Defender в глухой нокаут

📌 Оглавление Введение: проблема классической инъекции Что такое Callback Injection Почему это работает против Defender Полный разбор техники (с кодом) Как защититься Заключение 1. Введение Представьте...

Хабр
🚨 Booking.com Hit by Cyberattack Exposing Sensitive Customer Data - Lorenbot

Booking.com confirms data breach and warns of targeted scam risks Booking.com has confirmed it was...

Lorenbot

Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s embedded client (tsnet). Zero config, no daemon, no persistence - just a fast way in.

https://github.com/Yeeb1/SockTail

#infosec #cybersecurity #redteam #pentest

GitHub - Yeeb1/SockTail: Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s embedded client (tsnet). Zero config, no daemon, no persistence - just a fast way in.

Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s ...

GitHub

📣New 7ASecurity public #securityaudit report
🔒@openssl DEfO audited by 7ASecurity
https://7asecurity.com/blog/2026/04/defo-audit-by-7asecurity/
Feedback welcome as always, props to @ostifofficial for coordination

#CyberSecurity #OpenSource #SecurityAudit #PenTest #InfoSec

DEfO audit by 7ASecurity - 7ASecurity Blog

7ASecurity audited DEfO's ECH patchset and OpenSSL Core Integration: 5 security-impact findings (2 high), 6 hardening recommendations, and a threat model.

7ASecurity Blog