MacroPack v2.8.7 is out!
New GUI & updated EDR evasion! New features include Advanced LNK spoofing, expanded .NET obfuscation, and ML-evasion.
For authorized red-team use!
#RedTeam #offensivesecurity
@balliskit.bsky.social
BallisKit provides tooling and services to professional Pentesters & Red Teams. We develop MacroPack Pro and ShellcodePack. www.balliskit.com
MacroPack v2.8.7 is out!
New GUI & updated EDR evasion! New features include Advanced LNK spoofing, expanded .NET obfuscation, and ML-evasion.
For authorized red-team use!
#RedTeam #offensivesecurity
MacOS red-team made practical β Objective-C implant for DarwinOps!
Private Mythic C2 implant: lightweight (in-memory shellcode), post-exploitation, EDR & MDM evasion, integrates with DarwinOps + GateKeeper bypass.
Contact us for more details!
#RedTeam #macOS
The next version of MacroPack is going to be huge! A new GUI, updated EDR bypass profiles, new evasion options, and many other things :)
#redteam
Binary injection vulnerabilities can be found in many MacOS apps. Those may be abused to bypass EDR, hide backdoor, access memory, or bypass TCC!
DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them
#redteam
blog.balliskit.com/macos-dylib-...
ShellcodePack 2.7.5 is now available!
It includes updated bypass profiles for major EDRs
We also improved:
- ML detection evasion
- ETW Patch
- CallStack Spoofing
ShellcodePack can be used to weaponize any raw shellcode or PE including DotNET, Go, and Rust :)
#redteam
Initial Access on MacOS made easy !
DarwinOps now supports DMG phishing profiles!
Those are on shelf realistic templates with Gatekeeper bypass techniques :)
This version also introduce a binary injection vulnerability scanner for MacOS!
#redteam
MacOS DMG phishing templates are coming in the next DarwinOps release!
Ready to use, configurable, and with new GateKeeper bypass strategies!
#redteam
We are adding a binary injection vulnerability scanner to DarwinOps!
-> A DarwinOps JXA template
-> Scan for Injection vulnerabilities in binaries and Apps
Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC!
#redteam
Here is a reminder that a Powerful DotNET obfuscator is available in MacroPack. Assembly level obfuscation (or course). With the latest 2.7.5 it supports all your favorite #redteam DotNET tools!
And tested on major EDRs :)
blog.balliskit.com/obfuscation-...
MacOS security is very different from Windows.
DarwinOps, our redteam tool targeting MacOS can help you tackle that issue!
@antoineds.bsky.social just posted on our blog to help you understand the basics of initial access on MacOS with DarwinOps
#redteam
New tuto! Weaponize Mythic Apollo using MacroPack and ShellcodePack. Tested on EDRs of course.
blog.balliskit.com/tutorial-myt...
#redteam
A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce, and more will be released soon! Also, after Sliver, we a preparing tutorials with Mythic Apollo and Havoc π
#redteam
Rubeus and Mythic Apollo DotNET Payload Obfuscation with MacroPack!
This video demonstrates the next MacroPack Pro features:
- DotNET obfuscation and evasion
- EDR Bypass ready to use profiles
- Compatibility with Mythic Apollo stager
#redteam
youtu.be/mzuT1MAQSXY
How to weaponize Sliver C2 and evade EDRs?
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
DLL injection and DLL proxying on macOS? Yes it is possible! Checkout this blog by @antoineds.bsky.social
about macOS automated DYLIB injection!
blog.balliskit.com/macos-dylib-...
#redteam
How to weaponize Sliver C2 and evade EDRs?
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
Bypassing EDRs on MacOS can be a challenge.
In our new blog post, @antoineds.bsky.social describes how EDRs leverage MacOS Network Extension to detect C2s and how to bypass this kind of detection using Mythic Apfell as an example.
#redteam
blog.balliskit.com/when-osascri...
For us, EDR bypass is not just a buzzword.
MacroPack, ShellcodePack, and DarwinOps all come with bypass presets for major EDRs and Antivirus
Those presets are regularly updated and tested!
If you want to see a demo or an equivalent screenshot for the major EDRs contact us !
#redteam
Balliskit Evasion Tip π€
To help with static analysis detection by EDR,
ShellcodePack implements a method to load a shellcode from a separate file or from an URL
This tutorial explains how to use that option!
#redteam
blog.balliskit.com/loading-a-sh...
Redteaming on MacOS is hard... But BallisKit can help you!
You can use DarwinOps to weaponize a Mythic C2 implant for MacOS and bypass EDRs!
Checkout this blog Post by @antoinedss
#redteam
blog.balliskit.com/setup-and-we...
Obfuscate SharpHound? It's now possible with MacroPack. An version of MacroPack Pro was just released to improve our DotNET obfuscator!
We now support packages build with tools like Costura!
We tested we could obfuscate SharpHound, KrbRelay, and Mythic Apollo agent
You need to run Rubeus, Seatbelt, or other .NET tool on an EDR protected machine?
Well with the new version, MacroPack Pro is now also a powerful assembly obfuscation/weaponization tool ! π
We wrote a tutorial about that here:
blog.balliskit.com/obfuscation-...
We updated our "DLL Hijacking with ShellcodePack" tutorial following the release of version 2.7.2 π
blog.balliskit.com/dll-hijackin...
Did you know ShellcodePack can be used to pack and weaponize third party exe, dll, .NET in addition to raw shellcodes?
Example with Mimikatz!
#redteam
The video for my Advance Initial Access talk at Offensive X last year is available!
#redteam
Watch the talk here:
youtu.be/bA2p27gQK4M?...
Message for BallisKit customers!
We are looking for customers who are willing to endorse us on our website.
We often get asked about reference and it would be really helpful to show names. I know for some of you it's not possible but if you want to help please reach out it would really help us !
Need initial access payloads for MacOS?
Need help to bypass EDR on MacOS?
Need undetected persistance on MacOS?
Say no more and contact us about DarwinOps
Our redteam ToolKit dedicated to MacOS!
#redteam
Many redteamers are used to Windows but have difficulties to address Mac OS. To help them, BallisKit released DarwinOps!
This video demo:
- Generation of malicious application
- Code obfuscation
- EDR Bypass ready to use profiles
- Compatibility with C2
#redteam
youtu.be/8B1UOLxuTgM
The next MacroPack will include a DotNET weaponization scenario!
To obfuscate assemblies, and generate loaders in various languages.
Ex: Turn Rubeus into a VBS or BAT file and call it with arguments as if it was the original file!
Or just keep the EXE format if you prefer , but evade EDRs!
Good News my RedTeam friends!
New BallisKit tool to target MacOs:
DarwinOps π
Features:
- On shelf initial access scenarios
- Multiple formats
- Obfuscation methods and EDR bypass options
- Privilege escalation and persistence
- Compatible with several C2
#redteam