Martin Nadal on ‘#Obfuscating our presence / #parasitizing #infrastructures’ https://mur.at/project/worklab-2023/ #kig #graz #worklab2023 #diyarchiving #libraries #opensource #openknowledge #floss #freesoftware #alternativeto #hacktivism #digitalisation #Fangø #Fangøcam
#obfuscating #parasitizing #infrastructures #KIG #graz #worklab2023 #diyarchiving #libraries #opensource #openknowledge #floss #FreeSoftware #alternativeto #hacktivism #digitalisation #fango #fangocam
KASPERSKY #Bypassed again ;D
with Native API you can change #Process Memory very simple and i tested simple c# code to Convert payload #inmemory before running payload also after running payload with delay so In-memory every 60 secs only once RAW payload will run in memory and this code still needs to test but i did not have any error in Server-side or client-side and #Cobaltstrike commands worked very well but still needs to work on this code (this code just was for test),
btw code was not Detected by Kaspersky so i can say KASPERSKY Bypassed again ;D
anyway #Encrypting or #obfuscating in-memory can help you sometimes ;)
#penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest
#bypassed #process #inmemory #cobaltstrike #encrypting #obfuscating #penesting #redteaming #bypassav #evasion #redteam #pentest
#Obfuscating your #Primary Keys
Jesus, what a wall of text, but I like the content.