Top Categories

Spotlight

todayJanuary 2, 2024

Red Teaming + Social Engineering krptyk

Reverse Proxy Phishing With Evilginx

Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it [...]


Penetration Testing

8 Results / Page 1 of 1

Background

todayOctober 22, 2023

close

Red Teaming + Penetration Testing krptyk

Under the EDRadar: ADExplorer on Red Teams

Active Directory (AD) is the heart of many corporate networks, and as a penetration tester, understanding how to navigate and manipulate it is essential. In this guide, we will explore the powerful tool ADExplorer and uncover its various applications for offensive purposes. ADExplorer is part of Mark Russinovich’s Sysinternals suite, ...

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Encrypting Shellcode to Evade AV

Bypassing antivirus (AV) detection is a constant challenge for ethical hackers and penetration testers. One effective technique used by attackers is the encryption or obfuscation of malicious shellcode. In this blog post, we will explore a Go (Golang) program that encrypts shellcode, making it more difficult for AV software to ...

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Creating a DLL Shellcode Loader in Golang to Bypass Defender: A Step-by-Step Guide

In today’s blog post, we are going to explore the creation and functioning of a dynamic shellcode loader tailored for Windows. This loader is instrumental in bypassing specific security measures in Windows environments. Before we dive in, it is crucial to note that this tutorial is for educational purposes only ...