Creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities. Preparation of found theoretical vulnerability on large scale to be exploited.

Proxmark Adventures 101

I've been out to purchase a Proxmark for a long time, I've even checked out the fake ones on Taobao and AliExpress. I've recently moved to China to proceed with my YOLO start-up adventure towards spreading the good old “Red Team”, or attack mindset, practical, and technique driven services. Since »

Vultr Domain Hijacking

TLDR: Vultr does not verify domain ownership when adding new domains. This allows the hijack of abandoned domains by pretty much anyone with an account and verified payment method Disclosure Timeline 2018/04/09: Reported to Vultr to see if they will fix and accept under bug bounty program. 2018/ »

Payload Generation with CACTUSTORCH

Note: posted on June 2017 CACTUSTORCH is a framework for payload generation that can be used in adversary simulation engagements based on James Forshaw’s DotNetToJScript tool. This tool allows C# binaries to be bootstrapped inside a payload, providing reliable means to bypass many common defences. Currently CACTUSTORCH supports the »

Exploiting CVE-2017–0199: HTA Handler Vulnerability

Note: this was posted in April 2017 and was the first public post describing how to weaponise the vulnerability in contrast to the many posts at the time detailing its discovery from a defense perspective FireEye recently documented attacks of a 0-day vulnerability in the Windows HTA handler being exploited »

Bypassing Gmail Attachment Virus Check

Note: This was posted in January 2016 So today whilst doing some practice on creating trojanised Microsoft Word documents, I came across an issue. Gmail by default has a virus check on attachments if you want to send a malicious attachment out. To insert a payload into the word document, »