Cool feature coming soon to Brute Ratel 1.4 based on this project:
https://github.com/D1rkMtr/FilelessRemotePE
“…can use…any tool written in Clang/GCC in the memory of your own payload”. That would be a huge win because having to rewrite every BOF to be compatible with BRC4 is a gigantic pain and effectively eliminates one of the biggest benefits to BOFs…reuse.
#BruteRatel #BRC4 #BOF
Researchers at Proofpoint warn the #nighthawk commercial #pentesting framework is likely to be utilized by threat actors looking for #cobaltstrike and #BRc4 alternatives.
#nighthawk #pentesting #cobaltstrike #brc4
RT @NinjaParanoid@twitter.com
The aim of red team should always be to help the blue team and improve them. Thus along with the release blog of #BRc4 v1.3, I will be releasing detections till v1.2.9. Yara rules along with a detailed guide on detection and evasion will be available by EOD. Stay Tuned!
🐦🔗: https://twitter.com/NinjaParanoid/status/1593159993888747520
From Chetan Nayak (Brute Ratel C4 author):
"The aim of red team should always be to help the blue team and improve them. Thus along with the release blog of #BRc4 v1.3, I will be releasing detections till v1.2.9. Yara rules along with a detailed guide on detection and evasion will be available by EOD. Stay Tuned!"
A nice change from C2 authors that I'm not sure I've seen before. This will be a fun cat and mouse game of who can evade #Yara rules. #ThreatIntel #Malware
#brc4 #yara #threatintel #malware