Renaud Lifchitz :verified: · @nono2357
258 followers · 1433 posts · Server infosec.exchange

RT @VirtualAllocEx
Finally my new website is online, I also took the opportunity to rewrite my blog about tampering .

redops.at/en/

redops.at/en/blog/a-story-abou

#edrs #redteam #pentest #itsecurity

Last updated 1 year ago

Swissky :verified: · @swissky
900 followers · 284 posts · Server infosec.exchange

RT @VirtualAllocEx
Finally my new website is online, I also took the opportunity to rewrite my blog about tampering .

redops.at/en/

redops.at/en/blog/a-story-abou

#edrs #redteam #pentest #itsecurity

Last updated 1 year ago

JM ☠️ · @jmamblat
292 followers · 146 posts · Server infosec.exchange

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

github.com/optiv/Mangle

#edrs #infosec #cybersecurity #redteam

Last updated 2 years ago

as i said years ago C# and codes is really good for and also modern will use C# codes, because still Antivirus companies focus is on C/C++ codes more than others codes like C# also C# in-memory attacks really was successful experience against Anti-viruses (those days, even these days ;D) , now we see a lot course via C# programming also a lot C# Codes and Offensive C# Codes and Courses, that because Pentesters and Red-teamers really know what they can do by C# in win7,10,11 etc so this will be continue
But Some "beginner" Pentesters/Red-teamers think C# is not Useful for making Offensive codes which is "wrong mindset"

i can explain why C# Offensive programming is really useful and good for Pentesters/red-teamers etc, for example how you can use Windows programming to AVs/EDRs also how you can use .NET Features for compiling codes in-memory for bypassing AVs also why C# codes still is not in top priority for detecting via AVs and a lot and which is in .net and C# which you have not them in C/C++ very simple and ...

But

for explaining these C#.Net features "step-by-step with details" i use "ChatGPT" to explain much better for you.
so i + "ChatGPT" made our first Video together for you all to "explain technical details" why C# is one of top languages for programming .... ;D👇

#offensivesecurity #chatgpt #csharp #pentesting #redteaming #programming #offensive #Bypassing #antiviruses #edrs #malwares #api #bypass #methods #techniques #unique

Last updated 2 years ago

those Cyber Security guys which called itself or or "just because" they are in university (learning something As [basics ;D more often] or academic things or out-of-date things ;D) and they "did not have any Experience" in Cyber Security Fields (even 1 year) and some of them even did not have any good/unique/new Cyber Security Research or tools/codes (which shared before to public).
and yeah we call them beginner "geniuses" in cyber security lol

Vs

those Cyber Security Guys which they have at least 3-5 years experience of learning real/new/unique things in these fields like or or .

believe me your academic things are "Bullshit" and your instructors did not have updated content , they even don't have good viewpoint for cyber security fields like Penetration test or ... ,more often they don't have any experience of working with Offensive tools like Modern C2 servers, they don't know how you can write Offensive Codes like Writing server/agent (and why should do that) or they don't know how you can writing Offensive codes for bypassing or or other things ... you don't know about these things or a lot other things which you should learn them outside of university "by yourself".

you can learn these things from (with read Articles or Learn Courses which shared Publicly or Privately by and or or ) and you need at least 2-3 years experiences for learn these new things.

Some guys think if you know all tools in Kali linux then you can call yourself or Red-teamer, which is not true "geniuses".
Penetration testing is not about Tools , its about background "concepts" of tools omfg "remember this". (its about logic behind tools)

#pentester #redteamer #securityresearcher #penetrationtesting #redteaming #securityresearch #c2 #avs #edrs #Bypassing #infosec #communities #securityresearchers #pentesters #redteamers #blueteamers

Last updated 2 years ago