• Security tools
    • MacroPack
    • Glyptodon
      • Suggestions
      • Download
  • Links
  • Learning security
    • The human factor
    • Operating Systems
      • Windows
        • Code injection series
      • GNU Linux
    • Networks
      • Local Area Network
      • Firewalls, IDS, IPS
    • Miscellaneous
    • Malwares
    • Applications
      • Web applications
      • Java
  • Exploits
  • About us
  • Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads

    If you have ever been frustrated with manually writing Office/VBS payloads that ends up being detected by antivirus read this post! MacroPack Pro provides multiple options and templates related... Continue reading →

    D 21 January 2021     A Emeric Nasi     C 0 messages

1 | 2 | 3

  • Code Injection - Bypass start address protection

    Over the year several mechanisms were developed by vendors to prevent code injection. A common mechanism is to detect invalid start address of the injected thread. Here, as an...
    Continue reading →
    D 5 September 2019     A Emeric Nasi     C 0 messages
  • Code Injection - Process PE Injection Basics

    In this first part of the injection series, I am presenting how to inject and run code in a target process on Windows using the method called PE injection. This method allows...
    Continue reading →
    D 1 September 2019     A Emeric Nasi     C 0 messages
  • Bypass Windows Defender Attack Surface Reduction

    A redteam oriented study of Windows Defender Exploit Guard Attack Surface Reduction. Analysis of several rules, what triggers them and how to...
    Continue reading →
    D 24 February 2019     A Emeric Nasi     C 1 messages

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ... | 20

Search


Most popular

1.  VNC to access Kali Linux on Raspberry Pi

2.  Bypass Defender and other thoughts on Unicode RTLO attacks

3.  Yet another sdclt UAC bypass

4.  Hacking around HTA files

5.  PE injection explained


5 random articles

1.  VNC to access Kali Linux on Raspberry Pi

2.  Build a recovery toolkit

3.  Implement hash service using JCE

4.  TVT DVR/CCTV webshell exploit

5.  How to secure Linux users


Sponsor

If you appreciate my work, you may help or reward with a contribution :)

  • ->  Paypal donation

Most recent articles
  • 21 January – Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
  • 18 September 2020 – Advanced MacroPack payloads: XLM Injection
  • 18 September 2020 – EXCEL 4.0 XLM macro in MacroPack Pro
  • 2 September 2020 – Code Injection - Weaponize GhostWriting Injection
  • 25 May 2020 – Bypass Defender and other thoughts on Unicode RTLO attacks
  • 1 December 2019 – Code Injection - Disable Dynamic Code Mitigation (ACG)
  • 1 December 2019 – Code Injection - Exploit WNF callback
  • 5 September 2019 – Code Injection - Bypass start address protection

1 | 2 | 3 | 4 | 5

Recent comments
  • July 2020, tim :
    « Did you import any librarys in the python script as mine doesnt appear to (...) »
  • April 2020, Nanyo :
    « After spending a while to get everything to compile the injected code (...) »
  • February 2020, ajay :
    « In the code segment for stub at line 38, the realmain() function call is (...) »
  • August 2019, Emeric Nasi :
    « Hi, I am currently writing a new series of post on injection including a (...) »

1 | 2 | 3 | 4 | 5

Latest news
Tweets by EmericNasi

2010-2021 Sevagas
Archives | Log in | Contact

RSS 2.0 twitter linkedin facebook