|
You are here |
redteaming.co.uk | ||
| | | | |
bc-security.org
|
|
| | | | | [AI summary] The article discusses a technique called ScriptBlock Smuggling that allows attackers to spoof PowerShell security logs and bypass AMSI without reflection or patching, enabling stealthier cyber attacks. | |
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
blog.libove.org
|
|
| | | |||