Reverse Engineering
Our efforts in Reverse engineering aids in identifying vulnerabilities, understanding threats, and formulating robust defense mechanisms, making it integral to maintaining a secure and resilient digital environment.
Our efforts in Reverse engineering aids in identifying vulnerabilities, understanding threats, and formulating robust defense mechanisms, making it integral to maintaining a secure and resilient digital environment.
Our focus in malware research involves dissecting and understanding the operation of malicious software. By documenting their behavior and impact, we provide crucial insights that aid in devising effective defensive strategies, contributing to a better understanding and stronger defense against emerging cyber threats.
We offer penetration testing services, identifying vulnerabilities by simulating real-world attacks on your digital infrastructure. Our process uncovers potential threats, providing actionable insights for improved security measures, ensuring robust defense and resilience for your business operations.
Our involvement in open-source focuses on offensive security techniques and tools. We utilize and contribute to community-driven projects. This collaborative approach promotes innovative solutions, ultimately strengthening defense against evolving cyber threats.
I’m currently overwhelmed with commitments and unable to dedicate time to my public research and tools. Unfortunately, I can't predict when I’ll be more available. However, I’m still addressing bug fixes and urgent requests. I appreciate your understanding and continued support!
Here is a short example demonstrating the reflective loading of a Dynamic Link Library (DLL) into memory, whether sourced from disk or memory (supporting streams). This approach supports both 32-bit (PE) and 64-bit (PE+) DLLs. The technique enables the loading of exported functions either by their ordinal value or by the exported function name.
2 weeks, 4 days ago
New technique added: "Named Pipes / SMB," featuring two code snippets for demonstration purposes. The first snippet uses .NET (C#) to showcase Named Pipes usage, while the second employs WinAPI with Delphi. Both examples aim to illustrate the application of Named Pipes in different programming environments.
3 months, 2 weeks ago
New evasion technique and snippet added for file extension manipulation using the Right-to-Left Override (RLO) character (U+202E). Malicious actors exploit this Unicode control character in file names to alter the visual display of extensions, making dangerous executables appear harmless to users. For example, invoice.pdf
becomes invoiceexe.pdf
by strategically placing the RLO character. This deception aims to trick users into unwittingly executing potentially harmful files.
4 months, 1 week ago
An alternative version of the code snippet, crafted in Delphi, has been introduced for the "C2 via FTP(S)" technique. This variant expertly demonstrates the employment of the Windows API's from Windows Internet (WinInet) library.
6 months ago
A freshly added Unprotect C# code snippet elucidates the implementation of the "C2 via FTP(S)" technique. This example adeptly showcases the utilisation of the .NET Framework's WebRequest and FtpWebRequest classes, illustrating the steps to effectively execute tasks, handle requests, and manage responses through FTP (File Transfer Protocol).
6 months ago
A new version of the unprotect portal has been released with updates including:
FeaturedAPI is a new feature that allows for the mapping of common Microsoft Windows API's used by specific evasion techniques, with the ability to consult the most commonly used API's for each technique and their associated caution level (Low, Medium, High) as well as access to official and unofficial documentation.
The team is also making progress on the sample scanner to match scanned samples to potential fitting techniques.
10 months, 2 weeks ago
New Unprotect C# Code Snippet added for technique Timestomp
.
This tiny code snippet demonstrate the principle of file time stomping.
Steps:
Additional information:
1 year, 4 months ago
New Unprotect Delphi code snippet added for technique Process Hollowing, RunPE with support of both x86-32 and x86-64 in a single code.
1 year, 5 months ago
New Unprotect Delphi Code Snippet added for technique Checking Mouse Activity
1 year, 5 months ago
New Unprotect Delphi Code Snippet added for technique DLL Injection via CreateRemoteThread and LoadLibrary
with both support of x86-32 and x86-64.
1 year, 5 months ago
New Unprotect Delphi Code Snippet added for technique ProcEnvInjection - Remote code injection by abusing process environment strings
for both x86-32 and x86-64.
1 year, 5 months ago
New code snippet that demonstrate how Malware authors create self-deleting application. This technique rely on an external command line interpreter process that attempt to delete malware sample when sample process is terminated.
1 year, 5 months ago
New code snippet that demonstrate how Malware authors create self-deleting application. This technique rely on code injection to a remote process that is tasked to inspect for malware sample process end.
2 years, 9 months ago
New code snippet that demonstrate how to automatically detect code caves in Microsoft Windows PE Files.
It is then possible to inject a shellcode in located code-cave (optionally encrypted) and redirect PE file entrypoint to shellcode.
This was a common technique used by old school viruses to inject other applications and self-replicate.
Available commands:
-f
/ --file
: Valid PE File location (Ex: /path/to/calc.exe).-p
/ --payload
: Shellcode Payload (Example: "\x01\x02\x03…\x0a").-x
/ --encrypt
: Encrypt main section (entry point section).-k
/ --encryption-key
: Define custom encryption key (1 Byte only).-c
/ --cave-opcodes
: Define code opcode list to search for.-s
/ --cave-min-size
: Minimum size of region to be considered as code cave.-e
/ --egg
: Define a custom egg name (ESP Restore Mechanism).3 years, 1 month ago
New snippet that demonstrate the use of Windows API OutputDebugStringA and OutputDebugStringW to detect the presence of debuggers.
3 years, 2 months ago
New code snippet that demonstrate the usage of SuspendThread to detect the presence of debuggers.
3 years, 3 months ago
New code snippet that demonstrate how Malware authors detects the presence of debuggers using both Microsoft Windows API's: FindWindowA and FindWindowW API's.
3 years, 3 months ago
New code snippet that demonstrate how Malware authors detects the presence of debuggers using both Microsoft Windows API's: FindWindowA and FindWindowW API's.
3 years, 3 months ago
New code snippet that demonstrate how malware control the Debug
flag from a running process PEB (Process Environment Block) in order to detect the presence of a debugger.
3 years, 4 months ago