
safe
@safe0x17
Red Team Operator
ID: 1769330960678436864
http://github.com/safedv 17-03-2024 11:52:47
16 Tweet
254 Followers
208 Following

I'm excited to share ๐ฅ๐๐๐๐ถ๐ฐ๐ฒ๐ฐ. A Modern 64-bit ๐ฃ๐ผ๐๐ถ๐๐ถ๐ผ๐ป-๐๐ป๐ฑ๐ฒ๐ฝ๐ฒ๐ป๐ฑ๐ฒ๐ป๐ Shellcode Template for ๐ช๐ถ๐ป๐ฑ๐ผ๐๐, written ๐ถ๐ป ๐ฅ๐๐๐! #rustlang #CyberSecurity #redteam github.com/safedv/Rustic64




๐ฆ RustiveDump can now be compiled ๐ฎ๐ ๐๐ต๐ฒ๐น๐น๐ฐ๐ผ๐ฑ๐ฒ (๐ฃ๐๐) using the ๐ฅ๐๐๐๐ถ๐ฐ๐ฒ๐ฐ ๐ฑ๐ฒ๐๐ถ๐ด๐ป. LSASS memory dumper using only ๐ก๐ง ๐๐ฃ๐๐, supporting ๐ซ๐ข๐ฅ and ๐ฟ๐ฒ๐บ๐ผ๐๐ฒ ๐๐ฟ๐ฎ๐ป๐๐บ๐ถ๐๐๐ถ๐ผ๐ป. #redteam #ethicalhacking github.com/safedv/Rustiveโฆ

๐ฆ ๐ฅ๐๐๐๐ฉ๐๐๐ฆ๐๐๐ฐ๐ฎ๐น๐น๐: a Rust port of ๐๐ฎ๐๐ฒ๐ฟ๐ฒ๐ฑ๐ฆ๐๐๐ฐ๐ฎ๐น๐น that performs indirect syscalls while generating legitimate API call stack frames by abusing VEH, bypassing user-land EDR hooks in Windows. github.com/safedv/RustVEHโฆ #RedTeam #EthicalHacking


๐ฆ ๐ฅ๐๐๐๐ฆ๐ผ๐น๐ถ๐น๐ผ๐พ๐๐: Rust-based Internal-Monologue implementation for capturing NetNTLM hashes locally without touching LSASS. Using SSPI for NTLM negotiation and indirect NTAPIs for core operations. github.com/safedv/RustSolโฆ #redteam #ethicalhacking

๐ฆ ๐ฅ๐๐๐๐ฃ๐ผ๐๐ฎ๐๐ผ: A Rust implementation of ๐๐ผ๐ฑ๐ฃ๐ผ๐๐ฎ๐๐ผ, abusing ๐ฆ๐ฒ๐๐บ๐ฝ๐ฒ๐ฟ๐๐ผ๐ป๐ฎ๐๐ฒ to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. github.com/safedv/RustPotโฆ #redteam #ethicalhacking

I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/โฆ Project: github.com/x86matthew/Winโฆ
