BallisKit (@balliskit) 's Twitter Profile
BallisKit

@balliskit

BallisKit provides tooling and services to professional Pentesters & Red Teams.
We develop MacroPack, ShellcodePack, and DarwinOps.

#redteam #infosec

ID: 1273326390788722690

linkhttps://www.balliskit.com calendar_today17-06-2020 18:48:30

301 Tweet

2,2K Followers

33 Following

BallisKit (@balliskit) 's Twitter Profile Photo

Need initial access payloads for MacOS? Need help to bypass EDR on MacOS? Need undetected persistance on MacOS? Say no more and contact us about DarwinOps Our redteam ToolKit dedicated to MacOS! #redteam

Need initial access payloads for MacOS?
Need help to bypass EDR on MacOS?
Need undetected persistance on MacOS?

Say no more and contact us about DarwinOps
Our redteam ToolKit dedicated to MacOS!

#redteam
BallisKit (@balliskit) 's Twitter Profile Photo

How to weaponize Sliver C2 and evade EDRs? With BallisKit ShellcodePack and MacroPack of course! Checkout this new tutorial on our blog! #redteam blog.balliskit.com/tutorial-slive…

BallisKit (@balliskit) 's Twitter Profile Photo

DLL injection and DLL proxying on macOS? Yes it is possible! Checkout this blog by Antoine about macOS automated DYLIB injection! #redteam blog.balliskit.com/macos-dylib-in…

BallisKit (@balliskit) 's Twitter Profile Photo

Rubeus and Mythic Apollo DotNET Payload Obfuscation with MacroPack! This video demonstrates the next MacroPack Pro features: - DotNET obfuscation and evasion - EDR Bypass ready to use profiles - Compatibility with Mythic Apollo stager #redteam youtu.be/mzuT1MAQSXY

Melvin langvik (@flangvik) 's Twitter Profile Photo

It’s been a while since I made a video🫥, so here’s one looking at LDAPx by Artur Marzano , which is based on the amazing research present last year by Sabi and Daniel Bohannon youtu.be/GZ7Vbvf2Dso

Melvin langvik (@flangvik) 's Twitter Profile Photo

The video is sponsored by BallisKit They have been a huge supporter of my on-and-off streaming/YouTube journey for a year++ now, which I greatly appreciate 🥰

BallisKit (@balliskit) 's Twitter Profile Photo

A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce, and more will be released soon! Also, after Sliver, we a preparing tutorials with Mythic Apollo and Havoc 😎 #redteam

A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce,  and more will be released soon! Also, after Sliver, we a preparing  tutorials with Mythic Apollo and Havoc 😎

#redteam
BallisKit (@balliskit) 's Twitter Profile Photo

New tuto! Weaponize Mythic Apollo using MacroPack and ShellcodePack. Tested on EDRs of course. blog.balliskit.com/tutorial-mythi… #redteam

BallisKit (@balliskit) 's Twitter Profile Photo

MacOS security is very different from Windows. DarwinOps, our redteam tool targeting MacOS can help you tackle that issue! Antoine just posted on our blog to help you understand the basics of initial access on MacOS with DarwinOps #redteam blog.balliskit.com/macos-initial-…

BallisKit (@balliskit) 's Twitter Profile Photo

Here is a reminder that a Powerful DotNET obfuscator is available in MacroPack. Assembly level obfuscation (or course). With the latest 2.7.5 it supports all your favorite #redteam DotNET tools! And tested on major EDRs :) blog.balliskit.com/obfuscation-an…

Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

🔥 Not your typical remote access tool… but it works. Chrome Remote Desktop isn’t just for tech support—it can be quietly repurposed for red team operations. I break down the how and why in my latest post. 👇

Melvin langvik (@flangvik) 's Twitter Profile Photo

New video out 😊 showing how you can take control of port 445 and perform those magical relay attacks toward AD CS when working from a C2 agent. Way easier than before thanks to some great research by Nick Powers youtube.com/watch?v=e4f3h5…

BallisKit (@balliskit) 's Twitter Profile Photo

We are adding a binary injection vulnerability scanner to DarwinOps! -> A DarwinOps JXA template -> Scan for Injection vulnerabilities in binaries and Apps Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC! #redteam

We are adding a binary injection vulnerability scanner to DarwinOps!
 -> A DarwinOps JXA template
 -> Scan for Injection vulnerabilities in binaries and Apps
 
Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC!
 
 #redteam
BallisKit (@balliskit) 's Twitter Profile Photo

MacOS DMG phishing templates are coming in the next DarwinOps release! Ready to use, configurable, and with new GateKeeper bypass strategies! #redteam

MacOS DMG phishing templates are coming in the next DarwinOps release! 
Ready to use, configurable, and with new GateKeeper bypass strategies!

#redteam