joehowwolf Profile Banner
William Burgess Profile
William Burgess

@joehowwolf

Followers
2K
Following
19K
Media
46
Statuses
2K

Ex-theoretical physicist, currently terrible hacker and wannabe security researcher. Views are, regrettably, my own. Likes = bookmarks

Joined September 2014
Don't wanna be here? Send us removal request.
@joehowwolf
William Burgess
3 years
Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: https://t.co/SWLenJazWW PoC:
Tweet card summary image
github.com
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess) - WithSecureLabs/CallStackSpoofer
9
238
599
@_CobaltStrike
Cobalt Strike
2 months
New Blog: Based on his talk at Black Hat, @0xTriboulet discusses integrating Windows AI/ML APIs into Cobalt Strike’s workflows and presents proof-of-concept implementations for AI-augmented post-exploitation capabilities in Cobalt Strike. https://t.co/B8icpllZHV
2
31
62
@tijme
Tijme Gommers
2 months
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. https://t.co/761G96JDF1
12
97
258
@joehowwolf
William Burgess
2 months
I will be presenting at Beacon conf next week on “Linkers and Loaders: Experiments with Crystal Palace”. If you enjoy filthy PIC tradecraft it may be of interest!
eventbrite.co.uk
The fourth year of Beacon: London's home of hackers, hunters and EDR dodgers.
3
14
49
@33y0re
Connor McGarr
4 months
I am excited for us to finally share our fully user-mode detection agent research preview! Intel Processor Trace, Last Branch Record, thread scheduler and PMU telemetry all from user-mode, using the latest Windows features!
@PreludeResearch
Prelude Research
4 months
Announcing our whitepaper on the future of endpoint security. https://t.co/NogsQiku9B
3
28
122
@_RastaMouse
Rasta Mouse
4 months
Published a small collection of PIC loaders for Cobalt Strike, based on my experiments with Crystal Palace. https://t.co/Ftot017HXW
Tweet card summary image
github.com
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike - rasta-mouse/Crystal-Loaders
2
68
228
@TrustedSec
TrustedSec
5 months
Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @Oddvarmoe reveals a practical guide to repurposing Chrome Remote Desktop on red team operations. Read it now!
Tweet card summary image
trustedsec.com
0
85
236
@M_alphaaa
Matt Ehrnschwender
6 months
I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. https://t.co/herd91NIGF Supporting blog post about it.
blog.cybershenanigans.space
Intro This is a blog post written for a project I recently released. The source code for it can be found here on Github. Background The design of Cobalt Strike’s Beacon Object Files is rather unique...
6
65
208
@_RastaMouse
Rasta Mouse
5 months
[BLOG] Integrating Tradecraft Garden PIC loaders into Cobalt Strike https://t.co/vHZyptx3xo
1
36
131
@joehowwolf
William Burgess
5 months
[BLOG] Dynamically Instrumenting Beacon with BeaconGate - For All Your Call Stack Spoofing Needs!
Tweet card summary image
cobaltstrike.com
See how to instrument Beacon via BeaconGate and walk through return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr.
4
50
115
@natashenka
Natalie Silvanovich
6 months
The final part of @j00ru’s Windows Registry series is live! Contains all the hive memory corruption exploitation you’ve been waiting for https://t.co/OYiomWuQ6V
1
67
150
@_CobaltStrike
Cobalt Strike
8 months
Cobalt Strike 4.11 is out now! This release introduces a novel Sleepmask, a novel process injection technique, a new prepend reflective loader with new evasive options, asynchronous BOFs, DNS over HTTPs and more! https://t.co/h6ly1wxWp0
4
111
545
@joehowwolf
William Burgess
8 months
👀
@_CobaltStrike
Cobalt Strike
8 months
Cobalt Strike 4.11 is out now! This release introduces a novel Sleepmask, a novel process injection technique, a new prepend reflective loader with new evasive options, asynchronous BOFs, DNS over HTTPs and more! https://t.co/h6ly1wxWp0
0
1
25
@_CobaltStrike
Cobalt Strike
11 months
Planning on tinkering with #offensivesecurity over the holidays? After all, tis' the season to get ahead of #cyberattacks! In this short demo of the #CobaltStrike mutator kit we show how easy it is to generate LLVM randomized sleepmasks and #BOFs> https://t.co/lq8m2NXLrn
2
19
60
@joehowwolf
William Burgess
11 months
😍😍😍
@_RastaMouse
Rasta Mouse
11 months
I FINALLY got call stack spoofing working inside BeaconGate.
0
1
4
@_RastaMouse
Rasta Mouse
1 year
[BLOG] This post summarises how to tie Cobalt Strike's UDRL, SleepMask, and BeaconGate together for your syscall and call stack spoofing needs. https://t.co/7wTF0zqgPP
Tweet card summary image
rastamouse.me
I've been looking into Cobalt Strike's UDRL, SleepMask, and BeaconGate features over the last couple of days. It took me some time to understand the relationship between these capabilities, so the...
6
102
258
@_RastaMouse
Rasta Mouse
1 year
I drafted a janky mind map of Beacon's components and their relationships. Might be able to make it neater if people find it useful. Perhaps we could get this on a desk mat @joehowwolf 😅
9
50
274
@_CobaltStrike
Cobalt Strike
1 year
New blog: Get details on recent changes, upcoming plans for #CobaltStrike R&D, and our strategy for increased communication. https://t.co/OMBZxlReaA
1
23
63
@joehowwolf
William Burgess
1 year
New CS Blog - Revisiting the UDRL Part 3: https://t.co/69dLKAEsZ7 If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest 👀
Tweet card summary image
cobaltstrike.com
Learn UDRL's role in runtime masking, including how to track Beacon with BUD and loading an External C2 DLL at the same time as Beacon and mask both DLLs at runtime with Sleepmask-VS.
0
52
161
@GabrielLandau
Gabriel Landau
1 year
The video just went live for my recent @BlueHatIL talk about a new Windows vulnerability class, including an exploit for kernel code execution 👇 https://t.co/b1oRjXOKM5
2
34
112
@joehowwolf
William Burgess
1 year
When I was a sec consultant, one of my favourite days was when a new CS dropped and there were plenty of goodies to play with. A lot of effort went into this release and there is a looot of cool stuff to hack around with
0
0
32