76 Followers
0 Following
107 Posts
Drink all the booze hack all the things.
Bropper is an automatic Blind ROP exploitation tool: https://github.com/Hakumarachi/Bropper #infosec #security #ROP
GitHub - Hakumarachi/Bropper: An automatic Blind ROP exploitation tool

An automatic Blind ROP exploitation tool. Contribute to Hakumarachi/Bropper development by creating an account on GitHub.

GitHub
Unpack, modify, and repack binaries with OFRAK: https://github.com/redballoonsecurity/ofrak
#infosec
GitHub - redballoonsecurity/ofrak: OFRAK: unpack, modify, and repack binaries.

OFRAK: unpack, modify, and repack binaries. Contribute to redballoonsecurity/ofrak development by creating an account on GitHub.

GitHub
Reflective DLL Injection explained: https://youtu.be/IX0qUTbXNog
#infosec
Reflective DLL Injection explained

YouTube
A helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications: https://github.com/0xacb/recollapse
#infosec #Fuzzing
GitHub - 0xacb/recollapse: REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications

REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications - GitHub - 0xacb/recollapse: REcollapse is a helper tool for black-box ...

GitHub
Happy New Year Hackers!
#infosec

A 4 Day Rust Course From Android team's internal training: https://google.github.io/comprehensive-rust/

#Rust #infosec

Welcome to Comprehensive Rust 🦀 - Comprehensive Rust 🦀

OffSecOps: Using Jenkins For Red Team Tooling - HTTP418 InfoSec

An introductory guide on using Jenkins to automate the obfuscation of .NET binaries for red teaming. Based on the OffSecOps talk.

HTTP418 InfoSec
Inject .NET assemblies into an existing process: https://github.com/kyleavery/inject-assembly
#infosec #dotNET #RedTeam
GitHub - kyleavery/inject-assembly: Inject .NET assemblies into an existing process

Inject .NET assemblies into an existing process. Contribute to kyleavery/inject-assembly development by creating an account on GitHub.

GitHub
Remote NTLM relaying through meterpreter on Windows port 445

DiabloHorn
Understanding and Evading Get-InjectedThread

One of the many areas of this field that I really enjoy is the "cat and mouse" game played between RedTeam and BlueTeam, each forcing the other to up their game. Often we see some awesome tools being released to help defenders detect malware or shellcode execution, and knowing just how these defensive capabilities function is important when performing a successful pentest or RedTeam engagement. Recently I came across the awesome post "Defenders Think in Graphs Too!", which can be found over on

XPN InfoSec Blog