Blog

Enhancing ScheduleRunner

In the arsenal of a red team operator, adaptability and stealth…
18/12/2024/by Aldo Mihasi

A Native Application Subsystem Backdoor

What is a Native Application?
Most Windows applications come…
03/12/2024/by Nick Aliferopoulos

Treading carefully in Share Enumeration

Wherever there's Windows in corporate environments, there are…
26/10/2023/by Nick Aliferopoulos

From traditional to templated malware

This is a follow-up article to Introducing Blueprint which was…
19/06/2023/by Nick Aliferopoulos

Introducing Blueprint

Blueprint is a python3 source-code level modular templating solution based on Jinja. It is developed by the Hackcraft Red Team and is open-source and freely available.
19/05/2023/by Nick Aliferopoulos

Establishing Fairplay in Red Team engagements

Fairplay is an extensible modular framework that was developed by the Hackcraft Red Team, which aims to alleviate part of the heavy lifting of monitoring file hashes across multiple online-based sources, as well as provide an extensible way to generate notifications across multiple platforms.
17/05/2023/by Nick Aliferopoulos

Beyond Checkboxes: Red Teaming vs Traditional Security Assessments

In today’s ever-evolving cyber threat landscape, organizations require a robust security posture to safeguard their critical assets.

Defending Against the Surge: Red Teaming in the Wake of Ransomware Attacks in Europe and Greece

As we bid farewell to 2023, let us highlight some enlightening insights.  The research conducted by Corvus Insurance has shown a significant increase of over 95% in ransomware attacks compared to the previous year. According to Statista, over 72% of businesses worldwide were affected by ransomware attacks during 2023. Education, local and state government, healthcare, […]

Treading carefully in Share Enumeration

Wherever there’s Windows in corporate environments, there are Windows File (SMB) Shares. More often than not, during Adversary Simulation exercises operators need to enumerate which shares exist on which hosts, who can read and/or write to them, what files they contain, etc. Scenarios often arise that may even involve enumerating shares to write to them, […]