@8erg.bsky.social
π§ͺ | In The Lab π§βπ» | Cybersecurity Consultant π₯ | Debugging Life, One Round at a Time
How are you doing?
On my end, took some time off , to clear my mind
I spent the last 2 weeks doing these:
β‘οΈBoxing (I'm always boxing)
β‘οΈRunningβ¦walking
β‘οΈFasting (what can i say, I'm kind of a masochistπ)
Back next week to face the love of my lifeβ¦
I just released a blog post about performing a DLL Proxying via OneDriveServiceUpdater.exe.
Why did I chose this one...just because I wanted toπ€.
But you can perform this with any other executable the process is still the same
πLink: 8erg.github.io/posts/2025-0...
screenshot
Who can tell me the problem here...?π«
14.07.2025 18:54 β π 1 π 0 π¬ 0 π 0Every vibe coderπ
The zero-day that could've compromised every Cursor and Windsurf user
(Side note) But even editors like VS Code are prone to having malicious extensions too
www.bleepingcomputer.com/news/securit...
I would say hands down that reverse engineering, it's the most important skill, in cybersecurity or any other fields (try to change my mind)
11.07.2025 23:33 β π 1 π 0 π¬ 0 π 0who's going to defcon this year?
05.07.2025 05:41 β π 1 π 0 π¬ 0 π 0Here are some tools that I've discovered recently to test/verify AV evasion without burning my signatures:
πhttps://github.com/rasta-mouse/ThreatCheck
πhttps://github.com/BlackSnufkin/LitterBox
πhttps://github.com/CYB3RMX/Qu1cksc0pe
P-S : Qu1cksc0pe, is my favorite for nowπ€©
Useful resources:
π Official docs: sliver.sh/docs?name=Ge...
π Other open source C2s: howto.thec2matrix.com
π Installation guide I used:
Key features for those who want the specs:
β
Multi-platform support (Windows, Linux, macOS)
β
Multiple transports (HTTP, HTTPS, mTLS, DNS, WireGuard)
β
Feature extensions via "Armory"
β
Much more (honestly, I haven't finished experimenting myself π)
π Sliver uses msfvenom (linked to Metasploit) for shellcode generation (I didn't really divorce, keeping my options open... π)
π By default, implants will be detected by AV - disable Windows Defender for testing
π Requires MSF 6.2+
I think Sliver is an excellent starting point (experts welcome to suggest others!), especially because it doesn't make you leave your terminal (if you don't like your terminal, you need to quit techπ).
03.07.2025 03:46 β π 1 π 0 π¬ 0 π 0I usually use Metasploit as my command & control in labs. It's effective for beginners, but since I want to learn more sophisticated attacks, the ideal is to use a C2 specifically designed for Red Team operations.
03.07.2025 03:46 β π 1 π 0 π¬ 0 π 0I just got divorced...π Metasploit, I'm leaving you for SliverC2π
Jokes aside, I recently experimented with Sliver C2 and wanted to share my experience.
#RedTeam #CyberSecurity #PenetrationTesting
FluBot Android Malware Technical Analysis
threatmon.io/flubot-andro...
300 Malicious βVaporβ Apps Hosted on Google Play Had 60 Million Downloads
The life of an android user...π±
www.securityweek.com/300-maliciou...
Android trojan TgToxic updates its capabilities
intel471.com/blog/android...
BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites
cyble.com/blog/btmob-r...
Detecting Banker Malware Installed on Android Devices
devsec-blog.com/2024/03/dete...
Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease
P.S : Just learned recently that we can use native code inside an android appπ± (I know I'm late...)
www.bitdefender.com/en-us/blog/l...
OctoV2 Android Banking Trojan Masquerades as Deepseek AI in Phishing Attack
securityonline.info/octov2-andro...
An Analysis of Security System for Intrusion in Smartphone Environment
pmc.ncbi.nlm.nih.gov/articles/PMC...
How to detect and avoid malware on Android devices
www.kaspersky.com/resource-cen...
Banking data theft attacks on smartphones triple in 2024, Kaspersky reports
www.kaspersky.com/about/press-...
Android apps laced with North Korean spyware found in Google Play
arstechnica.com/security/202...
Google, Apple, and Microsoft Rush to Patch Actively Exploited Zero-Day Vulnerability
securityonline.info/google-apple...
objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.
github.com/sensepost/ob...
Any recommendation for it to be less painful?
07.03.2025 01:34 β π 0 π 0 π¬ 0 π 0xdaforum is your bestfriend, you'll probably find the steps required for your mobile phone...good luck!
07.03.2025 01:33 β π 1 π 0 π¬ 0 π 0