0xbbuddha

0xbbuddha

Base de connaissances

Par ici

README00
Recherche

Writeups

HackTheBox
CTF

Red Team Notes

Red Team Notes
AD Exploit
Privesc Windows
Privesc Linux
ESC
Pivoting
C2
Defense Evasion
Disable AV
Evading with Cobalt Strike
Payload Bypass
Memory & Config
Process OPSEC

Pentest Web Notes

Pentest Web Notes

Arch Linux Notes

Arch Linux Notes

Cheatsheets

Cheatsheets

Blog

Blog03
GitHubLinkedIn
0xbbuddha0xbbuddha

Defense Evasion

Evading with Cobalt Strike

Notes OPSEC Cobalt Strike : payloads, mémoire et processus.

3 entrées

Payload Bypass

Bypasser AV/AMSI sur les payloads compilés et scripts PowerShell.

Memory & Config

OPSEC mémoire Beacon et configuration Malleable C2.

Process OPSEC

PPID spoofing, spawnto et bypass des détections sur les lignes de commande.

Liens liés

Defense EvasionVue d'ensembleC2Infrastructure