Top Categories

Spotlight

todayJanuary 2, 2024

Red Teaming + Social Engineering krptyk

Reverse Proxy Phishing With Evilginx

Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it [...]


virus

3 Results / Page 1 of 1

Background

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Encrypting Shellcode to Evade AV

Bypassing antivirus (AV) detection is a constant challenge for ethical hackers and penetration testers. One effective technique used by attackers is the encryption or obfuscation of malicious shellcode. In this blog post, we will explore a Go (Golang) program that encrypts shellcode, making it more difficult for AV software to ...

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Creating a DLL Shellcode Loader in Golang to Bypass Defender: A Step-by-Step Guide

In today’s blog post, we are going to explore the creation and functioning of a dynamic shellcode loader tailored for Windows. This loader is instrumental in bypassing specific security measures in Windows environments. Before we dive in, it is crucial to note that this tutorial is for educational purposes only ...