Understanding the Windows _SECURITY_DESCRIPTOR
Released my write for gaining a fundamental understanding of the Windows _SECURITY_DESCRIPTOR structure. I then created a custom Windows Kernel shellcode stub to perform process injection for privilege escalation which is also implemented in Sickle :P
wetw0rk.github.io/posts/unders...
22.10.2025 14:33 — 👍 0 🔁 0 💬 0 📌 0
Trick or Treat!! Would you still love my malware if it was a worm 🥺❤️?
Sickle V4 has added a handler module for easy payload distribution and yes, you can do it over HTTPS!
Download it here: github.com/wetw0rk/Sick...
13.10.2025 14:07 — 👍 0 🔁 0 💬 0 📌 0
GitHub - wetw0rk/Sickle: Payload development framework
Payload development framework. Contribute to wetw0rk/Sickle development by creating an account on GitHub.
Sickle v3.1.0 is out!! Shellcode generation is now supported and I've added 9 new payloads including a reflective loader for Linux on both AARCH64 and x64! Along with a new module asm_shell which supports x86, x64, and AARCH64!
Check it out here:
github.com/wetw0rk/Sickle
17.12.2024 06:12 — 👍 0 🔁 0 💬 0 📌 0
Demo can be seen below :)
14.12.2024 04:06 — 👍 0 🔁 0 💬 0 📌 0
It’s that time of the year, when you put your elf on a shelf and your ELFs in memory. Sickle now supports payload generation for reflective ELF loading!
Currently AARCH64 (ARM64) and x86-64 supported.
May your ELF payloads never touch disk!
github.com/wetw0rk/Sickle
14.12.2024 04:05 — 👍 1 🔁 0 💬 1 📌 0
Se me olvidó el gif 😭
08.12.2024 22:19 — 👍 0 🔁 0 💬 0 📌 0
It's time to learn how to bypass the latest mitigations deployed on Windows. As part of this next tutorial, I am dropping Violet Phosphorous, a SMEP/VBS bypass tested against the latest Windows 11 (x64) build as of today!
You can find the post here:
wetw0rk.github.io/posts/0x01-k...
07.12.2024 07:12 — 👍 1 🔁 0 💬 0 📌 0