For red teamers, adaptability is everything. The ability to pivot quickly and exploit opportunities in dynamic environments is crucial. AtlasReaper, already a reliable ally in targeting Atlassian environments like Confluence and Jira, just became even more formidable. With the addition of BOF.NET-powered attachment downloading, this tool now offers capabilities tailored for stealth and efficiency in […]
In the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]
What is a Native Application? Most Windows applications come in two “flavors”, GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable’s PE header: There are actually quite a few Subsystem […]
Enhancing AtlasReaper
/in Cyber Security, Tools/by Aldo MihasiFor red teamers, adaptability is everything. The ability to pivot quickly and exploit opportunities in dynamic environments is crucial. AtlasReaper, already a reliable ally in targeting Atlassian environments like Confluence and Jira, just became even more formidable. With the addition of BOF.NET-powered attachment downloading, this tool now offers capabilities tailored for stealth and efficiency in […]
Enhancing ScheduleRunner
/in Cyber Security, Tools/by Aldo MihasiIn the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]
A Native Application Subsystem Backdoor
/in Cyber Security, Tools/by Nick AliferopoulosWhat is a Native Application? Most Windows applications come in two “flavors”, GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable’s PE header: There are actually quite a few Subsystem […]