Reverse Engineering
Our efforts in Reverse engineering aids in identifying vulnerabilities, understanding threats, and formulating robust defense mechanisms, making it integral to maintaining a secure and resilient digital environment.
Our efforts in Reverse engineering aids in identifying vulnerabilities, understanding threats, and formulating robust defense mechanisms, making it integral to maintaining a secure and resilient digital environment.
Our focus in malware research involves dissecting and understanding the operation of malicious software. By documenting their behavior and impact, we provide crucial insights that aid in devising effective defensive strategies, contributing to a better understanding and stronger defense against emerging cyber threats.
We offer penetration testing services, identifying vulnerabilities by simulating real-world attacks on your digital infrastructure. Our process uncovers potential threats, providing actionable insights for improved security measures, ensuring robust defense and resilience for your business operations.
Our involvement in open-source focuses on offensive security techniques and tools. We utilize and contribute to community-driven projects. This collaborative approach promotes innovative solutions, ultimately strengthening defense against evolving cyber threats.
I’m currently overwhelmed with commitments and unable to dedicate time to my public research and tools. Unfortunately, I can't predict when I’ll be more available. However, I’m still addressing bug fixes and urgent requests. I appreciate your understanding and continued support!
We are excited to announce that a new Snippets resource category has been implemented on the website. This addition will gradually provide a wide range of code snippets covering various topics related to Microsoft Windows. These snippets will offer valuable insights and practical examples to enhance your understanding of different aspects of Windows programming. Stay tuned as we continue to expand this resource with more code snippets in the future.
2 months, 3 weeks ago
The release of version "3.0 Final" signifies the culmination of this project. I will not be adding any further features; the objective of this PoC was to demonstrate the creation of a reliable and secure C2 utilizing FTP(S). You're encouraged to develop your own version with tailored functionalities. As an exercise, you might consider implementing multi-threading tasking to prevent the application from hanging during long-duration tasks.
I will, however, continue to provide support for the project in terms of addressing potential bugs or opportunities for optimization.
3 months ago
3 months ago
3 months ago
Support for encryption has been introduced, utilizing RSA and AES-GCM 256-bit algorithms, to safeguard the integrity and confidentiality of communications between agents and the C2 server.
3 months, 1 week ago
The complete project is now fully open-source! This includes the previously withheld SubSeven Server Service.
5 months, 3 weeks ago
10 months, 2 weeks ago
11 months, 1 week ago
I'm excited to announce that SubSeven Legacy, the remake of the iconic SubSeven 2.2, is now open-source! This is a great opportunity for enthusiasts and developers alike to dive deep into the intricate code that defined an era in InfoSec history. Please note, however, that only the SubSeven Server Service remains closed for the time being. Stay tuned for further updates and happy exploring!
1 year ago
FastResize
option was removed. 1 year, 6 months ago
Invoke-RemoteDesktopServer
error fixed during module import.1 year, 7 months ago
1 year, 7 months ago
1 year, 7 months ago
CTRL+C
SecureString
for authentication password.1 year, 8 months ago
TransportMode
option removed.1 year, 8 months ago
1 year, 8 months ago
SecureString
to handle password.1 year, 8 months ago
1 year, 8 months ago
1 year, 8 months ago
1 year, 8 months ago