0x12 Dark Development
@Salsa12__
Followers
277
Following
1K
Media
511
Statuses
675
Red Teamer focused in Malware Development Academy: https://t.co/ZjbiJABu9h GitHub: https://t.co/gPAp8snBfx Medium: https://t.co/CDFvAflWeG
Joined February 2022
Offensive Security Consulting We are glad to announce the new oficial service of our project. We are a professional offensive security development team ready to help cybersecurity professionals to reach the next level! https://t.co/mhzjYXPilt
1
0
4
Work published during the week: Medium: 1: https://t.co/SH2sjL4NP5 2: https://t.co/Q9y925H6je YouTube: 1: https://t.co/ChWsSfRgFu Shorts: 1: https://t.co/uJWi9LwLOm 2: https://t.co/AAgZG7Crqb
medium.com
Welcome to this new Medium post, in this one I will show you an interesting technique for infrastructure resilience in our C2 Server based…
0
0
2
This week you'll see what may be the best process injection technique I've ever created Frankenstein Process Injection
0
0
2
Domain Fail-over Strategy New Medium post, in this one I will show you a technique for resilience in our C2 Server based on Tor. Implement a failover logic in the redirector, so if the main redirector is down we can redirect the commands to another https://t.co/SH2sjL4NP5
medium.com
Welcome to this new Medium post, in this one I will show you an interesting technique for infrastructure resilience in our C2 Server based…
0
0
3
Working on a new maldev project, this time we are starting some AI implementations to help on our development phase
0
0
2
APC Process Injection using NtQueueApcThreadEx2 New Medium post, Today, we’re diving deep into Asynchronous Procedure Call (APC) process injection, specifically leveraging the advanced NtQueueApcThreadEx2 API. https://t.co/Q9y925H6je
0
0
2
The Learning C++ for Malware Development course has finished recording! So if all works out, you will have the courses available before the end of year or just at the early start of 2026 Do you want it before 2026?
1
0
3
New YouTube video showing how to enumerate AV trusted processes https://t.co/vvsZmPNrQ7
0
0
2
Implementing Communication Encryption in Tor C2 New Medium post, in this one I will show you my AES implementation to encrypt all the communications between the compromised victim and our Command and Control server https://t.co/2QtEu9qFix
medium.com
Welcome to this new Medium post, in this one I will show you my AES implementation to encrypt all the communications between the…
0
0
2
Work published during the week: Medium: 1: https://t.co/DgCRraOYrj 2: https://t.co/yCs1zIOeDx YouTube: 1: https://t.co/5pNNzLx0tq 2: https://t.co/0SbFp7iOZ4
medium.com
Welcome to this new Medium post. In this one, we’re working on the next part of the Tor-based C2. We’re protecting our endpoints to ensure…
0
0
2
In-Memory LSASS Dumping New Medium post. In this one, I will show an interesting and stealthy way to dump the LSASS process memory without touching disk. In the classic approach to LSASS dumping, we dump the process memory into a .dmp file. https://t.co/yCs1zIOeDx
0
0
2
Discord as the Command and Control Server it's an interesting option😉 What do you think?
0
0
1
Protecting Our Endpoints in Tor C2 Server New Medium post. In this one, we’re working on the next part of the Tor-based C2. We’re protecting our endpoints to ensure nobody can extract or manipulate information https://t.co/DgCRraPwgR
medium.com
Welcome to this new Medium post. In this one, we’re working on the next part of the Tor-based C2. We’re protecting our endpoints to ensure…
0
0
2
Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics
0
0
1
Adding domain failover logic to make sure that any of our C2 servers it is available for our operations
0
0
2