safe
@safe0x17
Followers
273
Following
61
Media
0
Statuses
17
Red Team Operator
0.0.0.0
Joined March 2024
๐ฆ Introducing ๐ฅ๐๐๐๐ถ๐๐ฒ๐๐๐บ๐ฝโLSASS memory dumper in pure Rust, using ๐ผ๐ป๐น๐ ๐ก๐ง ๐๐ฃ๐๐, creating a ๐บ๐ถ๐ป๐ถ๐บ๐ฎ๐น ๐บ๐ถ๐ป๐ถ๐ฑ๐๐บ๐ฝ from scratch, with no std, no CRT, and just ๐ญ๐ด๐๐! https://t.co/NF3DJElS6f
#redteam #CyberSecurity
github.com
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission. - safedv/RustiveDump
3
96
295
Mildly irritating things seen by malware nerds: - Person saying {thing} evades EDR and/or AV, but they've never performed against an enterprise environment with an active Blue Team (they don't know what they're talking about). Yes, your payload avoided basic analysis, but stop
11
50
736
I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. https://t.co/KbsWfdLT3D Project: https://t.co/xJvm24qqXv
github.com
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API - x86matthew/WinVisor
29
350
1K
๐ฆ ๐ฅ๐๐๐๐ฃ๐ผ๐๐ฎ๐๐ผ: A Rust implementation of ๐๐ผ๐ฑ๐ฃ๐ผ๐๐ฎ๐๐ผ, abusing ๐ฆ๐ฒ๐๐บ๐ฝ๐ฒ๐ฟ๐๐ผ๐ป๐ฎ๐๐ฒ to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. https://t.co/ue0V34GGWu
#redteam #ethicalhacking
github.com
A Rust implementation of GodPotato โ abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. - safedv/RustPotato
2
80
240
๐ฆ ๐ฅ๐๐๐๐ฆ๐ผ๐น๐ถ๐น๐ผ๐พ๐๐: Rust-based Internal-Monologue implementation for capturing NetNTLM hashes locally without touching LSASS. Using SSPI for NTLM negotiation and indirect NTAPIs for core operations. https://t.co/TpjfJQtMiq
#redteam #ethicalhacking
github.com
A Rust implementation of Internal-Monologue โ retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations. - safedv/RustSoliloquy
0
22
106
Interesting things that happened lately: October 31st: @safe0x17 released RustVEHSyscalls, a Rust port for LayeredSyscalls โ performs indirect syscalls while generating legitimate API call stack frames by abusing VEH October 30th: @FeribHellscream released a paper on forming a
6
41
210
๐ฆ ๐ฅ๐๐๐๐ฉ๐๐๐ฆ๐๐๐ฐ๐ฎ๐น๐น๐: a Rust port of ๐๐ฎ๐๐ฒ๐ฟ๐ฒ๐ฑ๐ฆ๐๐๐ฐ๐ฎ๐น๐น that performs indirect syscalls while generating legitimate API call stack frames by abusing VEH, bypassing user-land EDR hooks in Windows. https://t.co/KndPJrF1ZE
#RedTeam #EthicalHacking
github.com
A Rust port of LayeredSyscall โ performs indirect syscalls while generating legitimate API call stack frames by abusing VEH. - safedv/RustVEHSyscalls
2
39
130
๐ฆ RustiveDump can now be compiled ๐ฎ๐ ๐๐ต๐ฒ๐น๐น๐ฐ๐ผ๐ฑ๐ฒ (๐ฃ๐๐) using the ๐ฅ๐๐๐๐ถ๐ฐ๐ฒ๐ฐ ๐ฑ๐ฒ๐๐ถ๐ด๐ป. LSASS memory dumper using only ๐ก๐ง ๐๐ฃ๐๐, supporting ๐ซ๐ข๐ฅ and ๐ฟ๐ฒ๐บ๐ผ๐๐ฒ ๐๐ฟ๐ฎ๐ป๐๐บ๐ถ๐๐๐ถ๐ผ๐ป. #redteam #ethicalhacking
https://t.co/NF3DJElkgH
github.com
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission. - safedv/RustiveDump
1
22
89
Choosing the right #cybersecurity #certifications can feel like a maze ๐งฉ. Iโve shared some #tips on how to avoid common pitfalls and align your #CertificationPath with your #CareerGoals. Check it out at https://t.co/WvUtG700bZ
#InfoSec #CyberPath
link.medium.com
Navigating the landscape of cybersecurity certifications can feel overwhelming. With a plethora of options available, professionals oftenโฆ
0
1
1
๐ Just dropped Rustic64Shellโ64-bit position-independent reverse tcp shell for Windows, built in Rust! ๐ https://t.co/7Egfip1ZbH
#RedTeam #EthicalHacking #CyberSecurity
github.com
A 64-bit, position-independent code reverse TCP shell for Windows โ built in Rust. - safedv/Rustic64Shell
0
1
4
New on Medium: Analyzing the Rustic64 Project for building #Windows #Shellcode in #Rust. ๐ฆ๐ป Explore #PIC shellcode creation and dive into the code architecture! Check it out here: ๐ https://t.co/17skxEwvJl
#Cybersecurity #RustLang #MalwareDevelopment
link.medium.com
A Hands-On Analysis of the Rustic64 Project
0
6
11
I'm excited to share ๐ฅ๐๐๐๐ถ๐ฐ๐ฒ๐ฐ. A Modern 64-bit ๐ฃ๐ผ๐๐ถ๐๐ถ๐ผ๐ป-๐๐ป๐ฑ๐ฒ๐ฝ๐ฒ๐ป๐ฑ๐ฒ๐ป๐ Shellcode Template for ๐ช๐ถ๐ป๐ฑ๐ผ๐๐, written ๐ถ๐ป ๐ฅ๐๐๐! #rustlang #CyberSecurity #redteam
https://t.co/SF87YMJJrZ
github.com
64-bit, position-independent implant template for Windows in Rust. - safedv/Rustic64
2
26
109