Hey hackers! RomHack 2024 Call for Papers closes on May 31, if you plan to present your awesome research in Rome ๐ฎ๐น make sure to submit before that date!
See you in Rome ๐๐๐ท!
A walkthrough of using Ghidra to produce a GDB script for tracing function calls.
Hi, came here for some feedback and to share the tool with other red teamers.
Every opinion is very welcome.
The Freeway features: - Network monitor - Deauth attack - Beacon Flood - Packet Fuzzer - Network Audit - Channel Hopper
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.
This tutorial gives an example showing how to fuzz a function out of a compiled binary using AFL's QEMU mode.