Blog

Enhancing ScheduleRunner

In the arsenal of a red team operator, adaptability and stealth…
18/12/2024/by Aldo Mihasi

A Native Application Subsystem Backdoor

What is a Native Application?
Most Windows applications come…
03/12/2024/by Nick Aliferopoulos

Treading carefully in Share Enumeration

Wherever there's Windows in corporate environments, there are…
26/10/2023/by Nick Aliferopoulos

From traditional to templated malware

This is a follow-up article to Introducing Blueprint which was…
19/06/2023/by Nick Aliferopoulos

Introducing Blueprint

Blueprint is a python3 source-code level modular templating solution based on Jinja. It is developed by the Hackcraft Red Team and is open-source and freely available.
19/05/2023/by Nick Aliferopoulos

Establishing Fairplay in Red Team engagements

Fairplay is an extensible modular framework that was developed by the Hackcraft Red Team, which aims to alleviate part of the heavy lifting of monitoring file hashes across multiple online-based sources, as well as provide an extensible way to generate notifications across multiple platforms.
17/05/2023/by Nick Aliferopoulos

Enhancing ScheduleRunner

In the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]

A Native Application Subsystem Backdoor

A Native Application Subsystem Backdoor

What is a Native Application? Most Windows applications come in two “flavors”, GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable’s PE header: There are actually quite a few Subsystem […]

From Compliance to Resilience: The Synergy between DORA, TIBER EU and Red Teaming for Enhanced Security in the Financial Sector

The number of cyber-attacks has nearly doubled since the start of the COVID-19 pandemic. The IMF’s Global Financial Stability Report highlights the high exposure of the financial sector to cyber risks, with almost one-fifth of all incidents affecting financial firms. While cyber incidents have not been systematic so far, severe incidents at major financial institutions […]