mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

10K
active users

#shellcode

0 posts0 participants0 posts today
OTX Bot<p>Remcos RAT Malware Disguised as Major Carrier's Waybill</p><p>A sophisticated malware campaign has been discovered, utilizing the Remcos RAT disguised as a shipping company waybill. The attack begins with an email containing an HTML script, which when executed, downloads a JavaScript file. This file creates and downloads several components, including a configuration file, an encoded Remcos binary, a legitimate AutoIt loader, and a malicious AutoIt script. The AutoIt script employs evasion techniques, establishes persistence, decrypts the Remcos binary, and executes shellcode. The shellcode injects Remcos into a legitimate process (RegSvcs.exe) using various API calls. The Remcos RAT, once active, can steal information and execute remote commands based on C2 instructions. The campaign demonstrates the evolving tactics of cybercriminals, emphasizing the need for caution when handling emails from unknown sources.</p><p>Pulse ID: 67ebfc9f824c09e5b3ce991b<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67ebfc9f824c09e5b3ce991b" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67ebf</span><span class="invisible">c9f824c09e5b3ce991b</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-01 14:47:59</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Autoit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Autoit</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/HTML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTML</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a> <a href="https://social.raytec.co/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/Remcos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remcos</span></a> <a href="https://social.raytec.co/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemcosRAT</span></a> <a href="https://social.raytec.co/tags/ShellCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShellCode</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Operation HollowQuill: Russian R&amp;D Networks Targeted via Decoy PDFs</p><p>Operation HollowQuill targets Russian research and defense networks, particularly the Baltic State Technical University, using weaponized decoy documents disguised as research invitations. The attack chain involves a malicious RAR file containing a .NET dropper, which deploys a Golang-based shellcode loader and a legitimate OneDrive application. The final payload is a Cobalt Strike beacon. The campaign focuses on academic institutions, military and defense industries, aerospace and missile technology, and government-oriented research entities within the Russian Federation. The threat actor employs sophisticated techniques, including anti-analysis measures, APC injection, and infrastructure rotation across multiple ASNs.</p><p>Pulse ID: 67ea888fa30c32d310f46b3c<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67ea888fa30c32d310f46b3c" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67ea8</span><span class="invisible">88fa30c32d310f46b3c</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-31 12:20:31</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.raytec.co/tags/Golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Golang</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Military" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Military</span></a> <a href="https://social.raytec.co/tags/NET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NET</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PDF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PDF</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/ShellCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShellCode</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
h o ʍ l e t t<p>→ <a href="https://mamot.fr/tags/Speedrunners" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Speedrunners</span></a> are <a href="https://mamot.fr/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> researchers, they just don't know it yet<br><a href="https://zetier.com/speedrunners-are-vulnerability-researchers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zetier.com/speedrunners-are-vu</span><span class="invisible">lnerability-researchers/</span></a></p><p>“Super Mario World runners will place items in extremely precise locations so that the X,Y coordinates form <a href="https://mamot.fr/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> they can jump to with a dangling reference. Legend of <a href="https://mamot.fr/tags/Zelda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zelda</span></a>: Ocarina of Time players will do heap grooming and write a <a href="https://mamot.fr/tags/function" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>function</span></a> pointer […] so the game “wrong warps” directly to the <a href="https://mamot.fr/tags/end" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>end</span></a> <a href="https://mamot.fr/tags/credit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credit</span></a> sequence… with nothing more than a <a href="https://mamot.fr/tags/game" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>game</span></a> <a href="https://mamot.fr/tags/controller" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>controller</span></a> and a steady <a href="https://mamot.fr/tags/hand" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hand</span></a>”</p><p><a href="https://mamot.fr/tags/Mario" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mario</span></a></p>
Pyrzout :vm:<p>SideWinder targets the maritime and nuclear sectors with an updated toolset – Source: securelist.com <a href="https://ciso2ciso.com/sidewinder-targets-the-maritime-and-nuclear-sectors-with-an-updated-toolset-source-securelist-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/sidewinder-targe</span><span class="invisible">ts-the-maritime-and-nuclear-sectors-with-an-updated-toolset-source-securelist-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a>(Targetedattacks) <a href="https://social.skynetcloud.site/tags/MalwareDescriptions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareDescriptions</span></a> <a href="https://social.skynetcloud.site/tags/MalwareTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareTechnologies</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Targetedattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Targetedattacks</span></a> <a href="https://social.skynetcloud.site/tags/Defenseevasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defenseevasion</span></a> <a href="https://social.skynetcloud.site/tags/Windowsmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windowsmalware</span></a> <a href="https://social.skynetcloud.site/tags/securelistcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securelistcom</span></a> <a href="https://social.skynetcloud.site/tags/spearphishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spearphishing</span></a> <a href="https://social.skynetcloud.site/tags/APTreports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APTreports</span></a> <a href="https://social.skynetcloud.site/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://social.skynetcloud.site/tags/SideWinder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SideWinder</span></a> <a href="https://social.skynetcloud.site/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> #.NET <a href="https://social.skynetcloud.site/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://social.skynetcloud.site/tags/HTA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTA</span></a></p>
cryptax<p>Decai decompiling a malicious shellcode. <br>The instructions are not so readable, if you're not used to syscalls int 0x80. AI does it for you.</p><p><a href="https://asciinema.org/a/4PY8wn2TPg2oBdDQ0Q5bgMYjk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">asciinema.org/a/4PY8wn2TPg2oBd</span><span class="invisible">DQ0Q5bgMYjk</span></a></p><p><a href="https://mastodon.social/tags/r2ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>r2ai</span></a> <a href="https://mastodon.social/tags/decai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decai</span></a> <a href="https://mastodon.social/tags/r2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>r2</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
postmodern<p>What are people using as a syscall database?</p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/assembly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assembly</span></a> <a href="https://infosec.exchange/tags/asm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asm</span></a> <a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a></p>
Pyrzout :vm:<p>Shellcode over MIDI? Bad Apple on a PSR-E433, Kinda <a href="https://hackaday.com/2025/01/23/shellcode-over-midi-bad-apple-on-a-psr-e433-kinda/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/23/shellc</span><span class="invisible">ode-over-midi-bad-apple-on-a-psr-e433-kinda/</span></a> <a href="https://social.skynetcloud.site/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/MusicalHacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MusicalHacks</span></a> <a href="https://social.skynetcloud.site/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://social.skynetcloud.site/tags/badapple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>badapple</span></a> <a href="https://social.skynetcloud.site/tags/yamaha" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yamaha</span></a> <a href="https://social.skynetcloud.site/tags/video" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>video</span></a> <a href="https://social.skynetcloud.site/tags/midi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>midi</span></a></p>
IT News<p>Shellcode over MIDI? Bad Apple on a PSR-E433, Kinda - If hacking on consumer hardware is about figuring out what it can do, and pushing ... - <a href="https://hackaday.com/2025/01/23/shellcode-over-midi-bad-apple-on-a-psr-e433-kinda/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/23/shellc</span><span class="invisible">ode-over-midi-bad-apple-on-a-psr-e433-kinda/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/musicalhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>musicalhacks</span></a> <a href="https://schleuss.online/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://schleuss.online/tags/badapple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>badapple</span></a> <a href="https://schleuss.online/tags/yamaha" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yamaha</span></a> <a href="https://schleuss.online/tags/video" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>video</span></a> <a href="https://schleuss.online/tags/midi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>midi</span></a></p>
Alexandre Borges<p>The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:</p><p><a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a></p><p>I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.</p><p>Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).</p><p>Have a great day.</p><p><a href="https://mastodon.social/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Alexandre Borges<p>The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:</p><p><a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a></p><p>I would like to thank Ilfak Guilfanov @ilfak and <span class="h-card" translate="no"><a href="https://infosec.exchange/@HexRaysSA" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HexRaysSA</span></a></span> (on X) for their constant and uninterrupted support, which have helped me write these articles.</p><p>Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).</p><p>Have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/idapro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>idapro</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a></p>
postmodern<p>Is there an example of shellcode or other malware needing to use Floating Point assembly instructions?</p><p><a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/asm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asm</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p>World’s First MIDI <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shellcode</span></a> <a href="https://psi3.ru/blog/swl01u/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">psi3.ru/blog/swl01u/</span><span class="invisible"></span></a></p>
kriware :verified:<p>Basics of Windows shellcode writing</p><p>Dive into crafting Windows shellcode, from assembly basics to execution techniques. Essential for exploit development and system understanding.</p><p><a href="https://idafchev.github.io/exploit/2017/09/26/writing_windows_shellcode.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">idafchev.github.io/exploit/201</span><span class="invisible">7/09/26/writing_windows_shellcode.html</span></a></p><p><a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a></p>
Habr<p>[Перевод] Создание Powershell Shellcode Downloader для обхода Defender (Без обхода Amsi)</p><p>Сегодня я покажу, как модифицировать powershell shellcode runner для загрузки и выполнения нагрузки в обход Windows Defender. Я буду использовать shellcode runner, который применял ранее: <a href="https://github.com/dievus/PowerShellRunner/blob/main/runner.ps1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/dievus/PowerShellRu</span><span class="invisible">nner/blob/main/runner.ps1</span></a> Для демонстрации я использую виртуальную машину Windows с временно отключённым Defender. Я скопирую код и создам на его основе новый файл, используя PowerShell ISE.</p><p><a href="https://habr.com/ru/articles/868622/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/868622/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/paylaoad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>paylaoad</span></a> <a href="https://zhub.link/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://zhub.link/tags/av" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>av</span></a> <a href="https://zhub.link/tags/bypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bypass</span></a> <a href="https://zhub.link/tags/%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>информационная_безопасность</span></a> <a href="https://zhub.link/tags/%D1%85%D0%B0%D0%BA%D0%B8%D0%BD%D0%B3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>хакинг</span></a></p>
kriware :verified:<p>From C to shellcode (simple way)</p><p>This post explains the journey of turning C code into shellcode, including techniques to create compact and executable shellcode suitable for exploitation.</p><p><a href="https://print3m.github.io/blog/from-c-to-shellcode" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">print3m.github.io/blog/from-c-</span><span class="invisible">to-shellcode</span></a></p><p><a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a></p>
Habr<p>Thread execution hijacking. Исполнение шелл-кода в удаленном процессе</p><p>В статье разберем технику T1055.003 Подменим контекст потока удаленного процесса и рассмотрим способ доставки шелл-кода в процесс с помощью удаленного маппинга. В ОС Windows существует возможность получения контекста потока и последующего управления значениями регистров. Это дает возможность изменения потока выполнения, например, с помощью модификации регистра rip. Этим и будем пользоваться.</p><p><a href="https://habr.com/ru/articles/855710/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/855710/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/hijacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hijacking</span></a> <a href="https://zhub.link/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://zhub.link/tags/mapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mapping</span></a> <a href="https://zhub.link/tags/thread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thread</span></a></p>
Ricardo Alves<p>Ready to navigate the treacherous waters of buffer overflows? </p><p>Check my latest blog post: "Wherein We Study A Buffer Overflow And Ready Our Aim: testing the waters"</p><p>We'll now be ready to actually exploit the return address and use it for our own means.</p><p>Consider this the first step before shellcoding gallore.</p><p>🦶 Dip your toe here: <a href="https://dreaming-of-dragons.blogspot.com/2024/10/wherein-we-study-buffer-overflow.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dreaming-of-dragons.blogspot.c</span><span class="invisible">om/2024/10/wherein-we-study-buffer-overflow.html</span></a></p><p><a href="https://mastodon.social/tags/Shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shellcode</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/LowLevelProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LowLevelProgramming</span></a> <a href="https://mastodon.social/tags/TechBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechBlog</span></a> <a href="https://mastodon.social/tags/ExploitDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDevelopment</span></a></p>
Ricardo Alves<p>Ready for the troubled waters of shellcode? I'm not. Not just yet, at least. But I'm by the shore and telling you about it in my latest blog post: "Wherein We Wade Through A Shellcode Shore: before the dive</p><p>"</p><p>Spoiler alert: shellcode remains relevant (and fun).</p><p>👉 Check out: <a href="https://dreaming-of-dragons.blogspot.com/2024/10/wherein-we-wade-through-shellcode-shore.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dreaming-of-dragons.blogspot.c</span><span class="invisible">om/2024/10/wherein-we-wade-through-shellcode-shore.html</span></a></p><p><a href="https://mastodon.social/tags/Shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shellcode</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/LowLevelProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LowLevelProgramming</span></a> <a href="https://mastodon.social/tags/TechBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechBlog</span></a> <a href="https://mastodon.social/tags/ExploitDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDevelopment</span></a></p>
cryptax<p>See Sharem in action, emulating a Windows shellcode: <a href="https://www.youtube.com/watch?v=S1PI9O-q6eM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=S1PI9O-q6e</span><span class="invisible">M</span></a></p><p>I don't think it supports Linux shellcodes, does it? Also, I wonder what disassembler it uses.</p><p>NB. AI for Sharem was presented <span class="h-card" translate="no"><a href="https://infosec.exchange/@VirusBulletin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>VirusBulletin</span></a></span> </p><p><a href="https://mastodon.social/tags/vb2024" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vb2024</span></a> <a href="https://mastodon.social/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://mastodon.social/tags/emulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emulation</span></a> <a href="https://mastodon.social/tags/disassembly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disassembly</span></a></p>
Revista Occam's Razor<p>En el número <a href="https://masto.es/tags/ROOR07" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ROOR07</span></a> iniciamos una nueva sección llamada <a href="https://masto.es/tags/AprendeHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AprendeHacking</span></a> escribiendo tus propias herramientas. En este primer artículo escribimos una herramienta para volcar shellcodes</p><p><a href="https://masto.es/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://masto.es/tags/Shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shellcode</span></a> <a href="https://masto.es/tags/Capstone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Capstone</span></a> <a href="https://masto.es/tags/desensamblador" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>desensamblador</span></a> <a href="https://masto.es/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://masto.es/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> <a href="https://masto.es/tags/programacion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programacion</span></a> </p><p><a href="https://ibolcode.net/roor/2024-08-volcando-shellcodes--desensamblador-basico" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ibolcode.net/roor/2024-08-volc</span><span class="invisible">ando-shellcodes--desensamblador-basico</span></a></p>