Revisiting the User-Defined Reflective Loader Part 1: Simplifying Development

This blog post accompanies a new addition to the Arsenal Kit – The User-Defined Reflective Loader Visual Studio (UDRL-VS). Over the past few months, we have received a lot of feedback from our users that whilst the flexibility of the UDRL is great, there is not enough information/example code to get the most out of […]

Read More… from Revisiting the User-Defined Reflective Loader Part 1: Simplifying Development

Behind the Mask: Spoofing Call Stacks Dynamically with Timers

This blog introduces a PoC technique for spoofing call stacks using timers. Prior to our implant sleeping, we can queue up timers to overwrite its call stack with a fake one and then restore the original before resuming execution. Hence, in the same way we can mask memory belonging to our implant during sleep, we […]

Read More… from Behind the Mask: Spoofing Call Stacks Dynamically with Timers

Outflank OST Datasheet

OST is a curated set of offensive security tools created by expert red teamers. Ideal for advanced security teams testing even mature and sensitive target environments, this toolkit covers every significant step in the attacker kill chain, from difficult stages such as initial access to final exfiltration. Prioritizing Stealth and Evasion One of the key […]

Read More… from Outflank OST Datasheet

Looking Back & Moving Forward: 10 Years of Cobalt Strike

A decade after its debut by founder Raphael Mudge, Cobalt Strike has become a favorite tool of cybersecurity experts in every industry for adversary simulation and Red Team engagements. With more members than ever, the Cobalt Strike team has expanded its efforts on research activities to further add features, enhance security, and fulfill customer requests. We’d like to […]

Read More… from Looking Back & Moving Forward: 10 Years of Cobalt Strike

Elite Bundle Datasheet

Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that […]

Read More… from Elite Bundle Datasheet