BallisKit's Avatar

BallisKit

@balliskit.bsky.social

BallisKit provides tooling and services to professional Pentesters & Red Teams. We develop MacroPack Pro and ShellcodePack. www.balliskit.com

109 Followers  |  10 Following  |  24 Posts  |  Joined: 18.11.2024  |  1.8202

Latest posts by balliskit.bsky.social on Bluesky


Post image

MacroPack new version is out! πŸ₯³
With improved EDR evasion profiles and all kind of ready to use initial access formats and scenario!

Also now everything can be leveraged with the new BallisKit GUI! 😎

#redteam

03.02.2026 17:25 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
MacOS Redteam 4: Initial Access with AppleScript MacOS is often considered well protected, largely due to Gatekeeper. However, some execution vectors still operate under a different trust…

DarwinOps just leveled up πŸš€ Now supports AppleScript (SCPT), a format actively abused for macOS phishing. Plus new Ruby, VSCode , NPM & Homebrew payloads. A true macOS red team Swiss Army knife.

AppleScript initial access guide πŸ‘‡

blog.balliskit.com/macos-redtea...

22.01.2026 17:00 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Tutorial: DLL Sideloading and function proxying with ShellcodePack DLL sideloading is a technique that allows an attacker to have a legitimate signed application run some malicious code on Windows. It work…

Tutorial: DLL Sideloading and function proxying with ShellcodePack

BallisKit ShellcodePack version 2.8.0 is available! This version comes with a new GUI, EDR evasion methods as well as enhanced DLL sideloading/hijacking.

You can find the tutorial here:
blog.balliskit.com/tutorial-dll...

07.01.2026 17:07 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
MacOS Redteam 3: Initial Access with DarwinOps PKG State of the art:

PKG is a kind of MacOS MSI equivalent.
It's also used as an initial access payload!
Read how DarwinOps can be used to generate PKG for redteams.
We also included a method to run the PKG without admin privileges
-> Reduced number of clicks!

#redteam

blog.balliskit.com/macos-redtea...

20.11.2025 16:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

We are preparing a new version of ShellcodePack!
-> Automated and improved DLL sideloading/proxying capacity
-> AppDomain injection
-> New Responsive GUI!
-> Many more new features

And of course up to date EDR evasion :)

#shellcodepack

19.11.2025 17:14 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

MacroPack v2.8.7 is out!
New GUI & updated EDR evasion! New features include Advanced LNK spoofing, expanded .NET obfuscation, and ML-evasion.
For authorized red-team use!

#RedTeam #offensivesecurity

14.10.2025 16:10 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

MacOS red-team made practical β€” Objective-C implant for DarwinOps!
Private Mythic C2 implant: lightweight (in-memory shellcode), post-exploitation, EDR & MDM evasion, integrates with DarwinOps + GateKeeper bypass.

Contact us for more details!
#RedTeam #macOS

02.10.2025 16:00 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

The next version of MacroPack is going to be huge! A new GUI, updated EDR bypass profiles, new evasion options, and many other things :)

#redteam

24.09.2025 15:52 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
macOS DYLIB Injection at Scale: Designing a Self-Sufficient Loader Let’s explore Dylib injection and Dylib proxying on macOS (the equivalent of Windows DLL injection)

Binary injection vulnerabilities can be found in many MacOS apps. Those may be abused to bypass EDR, hide backdoor, access memory, or bypass TCC!

DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them

#redteam

blog.balliskit.com/macos-dylib-...

17.09.2025 16:25 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

ShellcodePack 2.7.5 is now available!

It includes updated bypass profiles for major EDRs
We also improved:
- ML detection evasion
- ETW Patch
- CallStack Spoofing

ShellcodePack can be used to weaponize any raw shellcode or PE including DotNET, Go, and Rust :)

#redteam

08.09.2025 16:16 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Initial Access on MacOS made easy !
DarwinOps now supports DMG phishing profiles!
Those are on shelf realistic templates with Gatekeeper bypass techniques :)

This version also introduce a binary injection vulnerability scanner for MacOS!

#redteam

14.08.2025 15:55 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

MacOS DMG phishing templates are coming in the next DarwinOps release!
Ready to use, configurable, and with new GateKeeper bypass strategies!

#redteam

01.08.2025 14:55 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

We are adding a binary injection vulnerability scanner to DarwinOps!
-> A DarwinOps JXA template
-> Scan for Injection vulnerabilities in binaries and Apps

Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC!

#redteam

22.07.2025 15:24 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Obfuscation and weaponization ofΒ .NET assemblies using MacroPack For a couple of years now,Β .NET have been the go to language for a lot of famous offensive security tools like Rubeus, SeatBelt…

Here is a reminder that a Powerful DotNET obfuscator is available in MacroPack. Assembly level obfuscation (or course). With the latest 2.7.5 it supports all your favorite #redteam DotNET tools!
And tested on major EDRs :)

blog.balliskit.com/obfuscation-...

25.06.2025 16:20 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

MacOS security is very different from Windows.
DarwinOps, our redteam tool targeting MacOS can help you tackle that issue!

@antoineds.bsky.social just posted on our blog to help you understand the basics of initial access on MacOS with DarwinOps

#redteam

23.06.2025 16:39 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Tutorial: Mythic Apollo with BallisKit MacroPack and ShellcodePack Learn how to weaponize Mythic Apollo with BallisKit redteaming tools

New tuto! Weaponize Mythic Apollo using MacroPack and ShellcodePack. Tested on EDRs of course.

blog.balliskit.com/tutorial-myt...

#redteam

06.06.2025 15:13 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce, and more will be released soon! Also, after Sliver, we a preparing tutorials with Mythic Apollo and Havoc 😎

#redteam

27.05.2025 15:08 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Rubeus and Mythic Apollo DotNET Payload Obfuscation with MacroPack
YouTube video by Sevagas Rubeus and Mythic Apollo DotNET Payload Obfuscation with MacroPack

Rubeus and Mythic Apollo DotNET Payload Obfuscation with MacroPack!

This video demonstrates the next MacroPack Pro features:
- DotNET obfuscation and evasion
- EDR Bypass ready to use profiles
- Compatibility with Mythic Apollo stager

#redteam

youtu.be/mzuT1MAQSXY

21.05.2025 15:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Tutorial: Sliver C2 with BallisKit MacroPack and ShellcodePack In this tutorial, we are going to see how to drop Sliver implants while evading security solutions using BallisKit tooling for Redteam.

How to weaponize Sliver C2 and evade EDRs?
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!

#redteam

blog.balliskit.com/tutorial-sli...

06.05.2025 15:57 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
macOS DYLIB Injection at Scale: Designing a Self-Sufficient Loader Let’s explore Dylib injection and Dylib proxying on macOS (the equivalent of Windows DLL injection)

DLL injection and DLL proxying on macOS? Yes it is possible! Checkout this blog by @antoineds.bsky.social
about macOS automated DYLIB injection!

blog.balliskit.com/macos-dylib-...

#redteam

16.05.2025 12:45 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Tutorial: Sliver C2 with BallisKit MacroPack and ShellcodePack In this tutorial, we are going to see how to drop Sliver implants while evading security solutions using BallisKit tooling for Redteam.

How to weaponize Sliver C2 and evade EDRs?
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!

#redteam

blog.balliskit.com/tutorial-sli...

06.05.2025 15:57 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
When Osascript Goes Undetected: A Look at EDR Network Blind Spots Discover how JXA subprocesses and custom network extensions can silently bypass macOS EDRs by evading audit and PID-based detection.

Bypassing EDRs on MacOS can be a challenge.
In our new blog post, @antoineds.bsky.social describes how EDRs leverage MacOS Network Extension to detect C2s and how to bypass this kind of detection using Mythic Apfell as an example.

#redteam

blog.balliskit.com/when-osascri...

15.04.2025 15:55 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

For us, EDR bypass is not just a buzzword.
MacroPack, ShellcodePack, and DarwinOps all come with bypass presets for major EDRs and Antivirus
Those presets are regularly updated and tested!

If you want to see a demo or an equivalent screenshot for the major EDRs contact us !

#redteam

03.04.2025 15:47 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Loading a shellcode from a file/URL with ShellcodePack Shellcode in EXE files can sometimes be detected during static analysis, requiring various kinds of obfuscation to bypass EDRs. This…

Balliskit Evasion Tip πŸ€–
To help with static analysis detection by EDR,
ShellcodePack implements a method to load a shellcode from a separate file or from an URL

This tutorial explains how to use that option!

#redteam

blog.balliskit.com/loading-a-sh...

20.03.2025 17:18 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Setup and weaponize Mythic C2 using DarwinOps to target MacOS We’ll look at how to set up Mythic C2 and its Apfell implant on MacOS. We will weaponize that implant to bypass EDRs using BallisKit…

Redteaming on MacOS is hard... But BallisKit can help you!
You can use DarwinOps to weaponize a Mythic C2 implant for MacOS and bypass EDRs!
Checkout this blog Post by @antoinedss

#redteam

blog.balliskit.com/setup-and-we...

06.03.2025 17:05 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Obfuscate SharpHound? It's now possible with MacroPack. An version of MacroPack Pro was just released to improve our DotNET obfuscator!
We now support packages build with tools like Costura!
We tested we could obfuscate SharpHound, KrbRelay, and Mythic Apollo agent

03.03.2025 16:54 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Obfuscation and weaponization ofΒ .NET assemblies using MacroPack For a couple of years now,Β .NET have been the go to language for a lot of famous offensive security tools like Rubeus, SeatBelt…

You need to run Rubeus, Seatbelt, or other .NET tool on an EDR protected machine?
Well with the new version, MacroPack Pro is now also a powerful assembly obfuscation/weaponization tool ! 😎

We wrote a tutorial about that here:
blog.balliskit.com/obfuscation-...

17.02.2025 16:32 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
DLL Hijacking using ShellcodePack Here is a little tutorial to perform some DLL Hijacking with BallisKit ShellcodePack (version 2.7.2 and above).

We updated our "DLL Hijacking with ShellcodePack" tutorial following the release of version 2.7.2 😎

blog.balliskit.com/dll-hijackin...

13.02.2025 17:34 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Did you know ShellcodePack can be used to pack and weaponize third party exe, dll, .NET in addition to raw shellcodes?
Example with Mimikatz!
#redteam

07.02.2025 17:11 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
OFFENSIVEX  Hacking Conference 2024 - Emeric Nasi
YouTube video by Offensive X OFFENSIVEX Hacking Conference 2024 - Emeric Nasi

The video for my Advance Initial Access talk at Offensive X last year is available!
#redteam

Watch the talk here:
youtu.be/bA2p27gQK4M?...

23.01.2025 16:15 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

@balliskit is following 9 prominent accounts