661 Followers
80 Following
266 Posts

Detection of EntryPoint Hijacking consists of the following:

1️⃣ EntryPoint address escapes the module’s DllBase range
2️⃣ MEM_IMAGE → MEM_PRIVATE transition
3️⃣ OriginalBase fails validation

🖊️ https://ipurple.team/2026/05/13/entrypoint-hijacking/

🎙️ EntryPoint Hijacking introduces a stealthier approach to code injection as it doesn’t use API calls that create a new thread within the context of a process.

Arbitrary code is written in memory, but it is executed only when a thread is created by the process legitimately.

🛠️ 𝐀 𝐍𝐞𝐰 𝐃𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧‑𝐅𝐨𝐜𝐮𝐬𝐞𝐝 𝐂𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐲
In the article, a 𝐭𝐨𝐨𝐥 is introduced that monitors:
🧠 The memory address of the EntryPoint
🧬 The EntryPoint memory type is changed to PRIVATE
🛑 OriginalBase is not valid

✒️ 𝐑𝐞𝐚𝐝 𝐭𝐡𝐞 𝐟𝐮𝐥𝐥 𝐚𝐫𝐭𝐢𝐜𝐥𝐞 https://ipurple.team/2026/05/13/entrypoint-hijacking/

EntryPoint Hijacking

The technique of EntryPoint Hijacking introduces a stealthier approach to code injection as it doesn’t use API calls that create a new thread within the context of a process, and it independe…

Purple Team

🚨 Cross‑Session Activation is a detection gap hiding in plain sight.
💡 The technique abstract below highlights the minimum viable signals for defenders.
💭 Interesting to know if this technique is part of your threat emulation library.

#detectionengineering #purpleteam #blueteam

PositiveIntent - Evasive loader for .NET Framework assemblies https://github.com/depthsecurity/PositiveIntent #redteam
GitHub - depthsecurity/PositiveIntent: Evasive loader for .NET Framework assemblies

Evasive loader for .NET Framework assemblies. Contribute to depthsecurity/PositiveIntent development by creating an account on GitHub.

GitHub

📉 𝐂𝐲𝐛𝐞𝐫 𝐬𝐢𝐠𝐧𝐚𝐥 𝐢𝐬 𝐝𝐫𝐨𝐩𝐩𝐢𝐧𝐠.
📈 𝐀𝐈 𝐧𝐨𝐢𝐬𝐞 𝐢𝐬 𝐫𝐢𝐬𝐢𝐧𝐠.

To help, I created a list of active cybersecurity blogs written by people who still publish real research.

If you follow any of these already (or have gems I should add), let me know.

📌https://github.com/netbiosX/CyberSec-Blogs #redteam #purpleteam #threathunting

GitHub - netbiosX/CyberSec-Blogs: Lists of independent cybersecurity blogs covering threat intelligence, purple team, red team, threat hunting, and detection engineering. Most are personal blogs maintained by practitioners who publish original research, tradecraft, and tooling.

Lists of independent cybersecurity blogs covering threat intelligence, purple team, red team, threat hunting, and detection engineering. Most are personal blogs maintained by practitioners who publ...

GitHub

Yesterday, I published a deep‑dive into how adversaries abuse the 𝐂𝐫𝐨𝐬𝐬-𝐒𝐞𝐬𝐬𝐢𝐨𝐧 𝐀𝐜𝐭𝐢𝐯𝐚𝐭𝐢𝐨𝐧 mechanism to execute code under another user’s interactive session, including some novel CLSIDs to use.

But here’s the catch 👇
In Red Team Ops, we typically rely on 𝒒𝒖𝒔𝒆𝒓, a built‑in Windows utility, to enumerate active sessions. It works, but only one host at a time, which slows down the enumeration stage.

🛠️ 𝐀 𝐍𝐞𝐰 𝐎𝐩𝐞𝐫𝐚𝐭𝐨𝐫‑𝐅𝐨𝐜𝐮𝐬𝐞𝐝 𝐂𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐲
In the article, a 𝐭𝐨𝐨𝐥 (private at this stage) was introduced that can:
🔍 Enumerate active sessions 𝐚𝐜𝐫𝐨𝐬𝐬 𝐚𝐧 𝐞𝐧𝐭𝐢𝐫𝐞 𝐈𝐏 𝐫𝐚𝐧𝐠𝐞
⚡ Quickly identify hosts suitable for Cross‑Session Activation
🎯 Reduce manual enumeration and accelerate target selection

✒️ 𝐑𝐞𝐚𝐝 𝐭𝐡𝐞 𝐟𝐮𝐥𝐥 𝐚𝐫𝐭𝐢𝐜𝐥𝐞
https://ipurple.team/2026/05/04/cross-session-activation/

Cross-Session Activation

Traditional lateral movement techniques are no longer applicable in the modern era due to developments in the detection capability by most of the EDR vendors. Techniques that abuse legitimate Windo…

Purple Team
Phantom-Evasion-Loader - a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF) https://github.com/JM00NJ/Phantom-Evasion-Loader #redteam
GitHub - JM00NJ/Phantom-Evasion-Loader: Phantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). It leverages advanced techniques such as SROP and Zero-Copy Injection to deliver payloads as a ghost in the machine.

Phantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). It l...

GitHub
📝 Missed the write‑up on abusing SpeechRuntime for lateral movement?
This diagram summarizes the chain.⤵️
🖊️ https://ipurple.team/2026/04/07/microsoft-speech/ #purpleteam

📢 New Article: Lateral Movement via Microsoft Speech
🎙️ Microsoft Speech Platform is built-in in Windows environments to enable Speech recognition, Voice input, Text-to-Speech & Speech features in Windows, Edge & Office
🦄 Deep‑dive playbook on how Microsoft Speech can be abused for lateral movement and how defenders can perform detection.
📖 1x Playbook
💡 Detection Opportunities
🏹 1x MDE Query

𝐃𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 - 𝐄𝐯𝐞𝐧𝐭 𝐈𝐃'𝐬
✅️ 4657 & 4663 - {655D9BF9-3876-43D0-B6E8-C83C1224154C}
✅️ 4688 - SpeechRuntime.exe
✅️ 7040 & 7036 - RemoteRegistry Service

✒️ https://ipurple.team/2026/04/07/microsoft-speech/ #purpleteam #blueteam #detectionengineering

Microsoft Speech

SpeechRuntime is a legitimate Windows component that supports Microsoft’s speech-related capabilities, including voice input and speech recognition features used across modern Windows experie…

Purple Team