RtlDallas Profile Banner
Rtl Dallas Profile
Rtl Dallas

@RtlDallas

Followers
506
Following
15
Media
8
Statuses
35

Joined August 2023
Don't wanna be here? Send us removal request.
@RtlDallas
Rtl Dallas
14 days
Released my Cobalt Strike BOF for fork & run injection! Features Draugr stack spoofing, PPID spoofing, multiple execution methods, and indirect syscalls for enhanced OpSec. https://t.co/kfiAcfLSaY
6
74
279
@RtlDallas
Rtl Dallas
16 days
I just pushed an update to Draugr. The code is cleaner and easier to use, with macros for indirect syscalls and API calls over a synthetic stack frame. I’ve also updated the README to explain how it works. https://t.co/9pWckvorBi
0
5
22
@quarkslab
quarkslab
1 month
Finding a buggy driver is one thing, abusing it is another. In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀 ➡️ https://t.co/frVCTiqVTB
0
30
72
@0xKylm
Kylm
3 months
Edrs do nasty stuff, checking callstack etc. It's possible to spoof it but remember we lazy but our compiler is very very kind
1
7
54
@0xKylm
Kylm
3 months
You're lazy, I'm lazy, so what if your compiler did the evasion for you? Based on my blogpost from earlier this week: https://t.co/SMvBNycUcX
4
33
129
@RtlDallas
Rtl Dallas
4 months
0
3
48
@DinerHell
Hell Diner
5 months
🔥Release 1.0.1-alpha of Arion is out🔥 https://t.co/AKq90X2JV6 The C++ emulation framework has many new features and is getting more and more stable. Here is a short thread about the main additions :
1
9
25
@RtlDallas
Rtl Dallas
5 months
🚀 MemLoader is live! Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible, so turning it into shellcode is painless. https://t.co/0zMX6L0ftv
Tweet card summary image
github.com
Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible - NtDallas/MemLoader
0
70
177
@RtlDallas
Rtl Dallas
5 months
Since I got mentioned in a blog post, can I have a Cobalt Strike hoodie haha ? :p
@joehowwolf
William Burgess
5 months
[BLOG] Dynamically Instrumenting Beacon with BeaconGate - For All Your Call Stack Spoofing Needs!
1
1
28
@infosecnoodle
noodlearms
6 months
Short post on an alternative method for obtaining Microsoft Entra refresh tokens via Beacon. Proof of concept BOF is available on my GitHub 🙂
Tweet card summary image
infosecnoodle.com
An alternative technique for obtaining Microsoft Entra refresh tokens (and "family refresh tokens") using beacon on a compromised endpoint.
1
64
161
@_atsika
Atsika
7 months
ProxyBlob is alive ! We’ve open-sourced our stealthy reverse SOCKS proxy over Azure Blob Storage that can help you operate in restricted environments 🔒 🌐 https://t.co/KO4AYUDTmb Blog post for more details right below ⬇️
Tweet card summary image
github.com
SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication. - quarkslab/proxyblob
@quarkslab
quarkslab
7 months
Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out @_atsika's article on how it came to exist after an assumed breach mission ⤵️ 👉 https://t.co/ApZloWD3hl
3
45
112
@RtlDallas
Rtl Dallas
9 months
New update for Draugr! 🙂 Now supports indirect syscalls with a synthetic stack frame. I’ve removed Draugr-Strike and replaced it with Cobalt Strike's process injection kit (Thread Spoof or Early Bird) using indirect syscalls and a synthetic stack frame. https://t.co/9pWckvnTLK
Tweet card summary image
github.com
BOF with Synthetic Stackframe. Contribute to NtDallas/Draugr development by creating an account on GitHub.
0
22
77
@RtlDallas
Rtl Dallas
10 months
Based on Draugr's code for synthetic stack frames, I have created a UDRL for Cobalt Strike's Beacon and post-ex DLLs. The UDRL for Beacon uses BeaconUserData.h to pass memory allocation information to Beacon, making it compatible with the sleepmask kit. https://t.co/BaJjQ56fow
Tweet card summary image
github.com
Cobaltstrike Reflective Loader with Synthetic Stackframe - NtDallas/OdinLdr
0
28
93
@RtlDallas
Rtl Dallas
10 months
CobaltStrike BOF template to make a synthetic stack frame with a randomly chosen gadget for each call. Additionally, a project for remote shellcode injection is included, providing an example of how to use it https://t.co/9pWckvorBi
Tweet card summary image
github.com
BOF with Synthetic Stackframe. Contribute to NtDallas/Draugr development by creating an account on GitHub.
0
40
125
@RtlDallas
Rtl Dallas
11 months
I just released a tool to execute assemblies from unmanaged processes with HWBP/Patching (choice at compilation). For HWBP, I hook threads created by the assembly and thread pooling used by the CLR. https://t.co/xDIvhCvzbK
0
28
96
@0xKylm
Kylm
11 months
With some friends @shard7_ and @abel_theo3 We wrote a pretty cool linux rootkit. With an hypervisor from scratch and eBPF programs. Still a work-in-progress! Check it out:
Tweet card summary image
github.com
A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs - DualHorizon/blackpill
4
34
104
@RtlDallas
Rtl Dallas
11 months
I just pushed a small update to Svartalfheim. The shellcode is now executed using a spoofed thread, and the stage0 shellcode self-deletes from memory. https://t.co/VM8NuuEROb
Tweet card summary image
github.com
Stage 0. Contribute to NtDallas/Svartalfheim development by creating an account on GitHub.
0
19
64
@RtlDallas
Rtl Dallas
11 months
Svartalfheim: Shellcode for stage 0, Nt API calls made using indirect syscalls, and LoadLibraryA/WinHttp calls performed with return address spoofing https://t.co/VM8NuuEROb
0
23
110
@RtlDallas
Rtl Dallas
11 months
Small update on KrakenMask, I have added stack masking during sleep to avoid detection with HuntBeaconSleep-NG
github.com
Sleep obfuscation. Contribute to NtDallas/KrakenMask development by creating an account on GitHub.
7
24
69
@RtlDallas
Rtl Dallas
1 year
Ulfberht: A Shellcode Loader with Advanced Evasion Features: - Indirect syscalls - Module stomping with LoadLibraryExAPC - RC4 Encryption & UUID Encoding for Payload - Direct Execution Without Creating a New Thread - NoCRT https://t.co/I849ulL58V
Tweet card summary image
github.com
Shellcode loader. Contribute to NtDallas/Ulfberht development by creating an account on GitHub.
1
53
186