at TyphoonCon are implemented in the current version of ShellcodePack.
| Infosec Blog | https://blog.sevagas.com |
| My LinkedIn | https://www.linkedin.com/in/emeric-nasi-84950528/ |
| Infosec Blog | https://blog.sevagas.com |
| My LinkedIn | https://www.linkedin.com/in/emeric-nasi-84950528/ |
We just released ShellcodePack 2.4.0!! It includes:
- 2 DLL Unhooking methods
- SCR and PIF gen
- New emulation bypass methods
- Encrypted zip and 7zip containers
Checkout this video:
https://youtu.be/4d-dtrKq6B8
I will be at OffensiveCon
in Berlin end of the week. Send me a message if you want to have a drink/talk :)
See you there!
ShellcodePack 2.3.1 is available 🥳
Main new features are:
- New option to artificially inflate PE file size
- New option to spoof manifest of given PE
- Support of x96 architecture in the GUI
- New option to patch ETW in local process
#redteam
OneNote payloads have hyped a lot since Lance (@unit221b
) and myself published "RedTeam With OneNote" last summer!
#redteam