0xbugatti
@0xbugatti
AMSI|ShellCode|Kerberos Fucker|
Blog:š redme.gitbook.io/redme/
RedTeamer Works in IR
ID: 1563984945940398080
28-08-2022 20:20:56
32 Tweet
259 Followers
281 Following
A playload used to bypass WAF, by Md Ismail Å ojalīØ š·ļø /login?redirectUrl=javascript%3avar{a%3aonerror}%3d{a%3aalert}%3bthrow%2520document.domain
Hey Gus š Do you want to know what's the Assembly Reflection in .Net š¤ Please check this code Basics through C# github.com/0xBugatti/Basi⦠Basics through Powershell Projects github.com/0xBugatti/MalD⦠Reflection Usage -Damage AMSI -In-Memory PE Execution -evade RunTime callingš
After holding the talks at /ĖziĖf-kÉn/ and TROOPERS Conference done, I also finally managed to write down my latest research about userland hook evasion: s3cur3th1ssh1t.github.io/Cat_Mouse_or_Cā¦