Category: Exploitation

Obfuscator

Obfuscator: obfuscate the shellcode

Obfuscator What is encryption?   In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form...

NAT Slipstreaming

NAT Slipstreaming: bypassing the victim’s NAT/firewall

NAT Slipstreaming NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary firewall pinhole control), just by the victim visiting...

shellcode loader

Alaris: defeats modern EDR systems

Alaris Alaris is a new and sneaky shellcode loader capable of bypassing most EDR systems as of today (10/14/2020). It uses several known TTP’s that help protect the malware and...

WINspect

AMSI.fail: generates obfuscated PowerShell snippets

AMSI.fail C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process. The snippets are randomly selected from a small...