We develop MacroPack Pro and ShellcodePack.
www.balliskit.com
New GUI & updated EDR evasion! New features include Advanced LNK spoofing, expanded .NET obfuscation, and ML-evasion.
For authorized red-team use!
#RedTeam #offensivesecurity
New GUI & updated EDR evasion! New features include Advanced LNK spoofing, expanded .NET obfuscation, and ML-evasion.
For authorized red-team use!
#RedTeam #offensivesecurity
#redteam
#redteam
DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them
#redteam
blog.balliskit.com/macos-dylib-...
DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them
#redteam
blog.balliskit.com/macos-dylib-...
It includes updated bypass profiles for major EDRs
We also improved:
- ML detection evasion
- ETW Patch
- CallStack Spoofing
ShellcodePack can be used to weaponize any raw shellcode or PE including DotNET, Go, and Rust :)
#redteam
It includes updated bypass profiles for major EDRs
We also improved:
- ML detection evasion
- ETW Patch
- CallStack Spoofing
ShellcodePack can be used to weaponize any raw shellcode or PE including DotNET, Go, and Rust :)
#redteam
DarwinOps now supports DMG phishing profiles!
Those are on shelf realistic templates with Gatekeeper bypass techniques :)
This version also introduce a binary injection vulnerability scanner for MacOS!
#redteam
DarwinOps now supports DMG phishing profiles!
Those are on shelf realistic templates with Gatekeeper bypass techniques :)
This version also introduce a binary injection vulnerability scanner for MacOS!
#redteam
Ready to use, configurable, and with new GateKeeper bypass strategies!
#redteam
Ready to use, configurable, and with new GateKeeper bypass strategies!
#redteam
-> A DarwinOps JXA template
-> Scan for Injection vulnerabilities in binaries and Apps
Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC!
#redteam
-> A DarwinOps JXA template
-> Scan for Injection vulnerabilities in binaries and Apps
Vulnerable binaries could be abused to bypass EDR, hide a backdoor, access memory, or bypass TCC!
#redteam
And tested on major EDRs :)
blog.balliskit.com/obfuscation-...
And tested on major EDRs :)
blog.balliskit.com/obfuscation-...
DarwinOps, our redteam tool targeting MacOS can help you tackle that issue!
@antoineds.bsky.social just posted on our blog to help you understand the basics of initial access on MacOS with DarwinOps
#redteam
DarwinOps, our redteam tool targeting MacOS can help you tackle that issue!
@antoineds.bsky.social just posted on our blog to help you understand the basics of initial access on MacOS with DarwinOps
#redteam
blog.balliskit.com/tutorial-myt...
#redteam
blog.balliskit.com/tutorial-myt...
#redteam
#redteam
#redteam
This video demonstrates the next MacroPack Pro features:
- DotNET obfuscation and evasion
- EDR Bypass ready to use profiles
- Compatibility with Mythic Apollo stager
#redteam
youtu.be/mzuT1MAQSXY
This video demonstrates the next MacroPack Pro features:
- DotNET obfuscation and evasion
- EDR Bypass ready to use profiles
- Compatibility with Mythic Apollo stager
#redteam
youtu.be/mzuT1MAQSXY
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
about macOS automated DYLIB injection!
blog.balliskit.com/macos-dylib-...
#redteam
about macOS automated DYLIB injection!
blog.balliskit.com/macos-dylib-...
#redteam
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
With BallisKit ShellcodePack and MacroPack of course!
Checkout this new tutorial on our blog!
#redteam
blog.balliskit.com/tutorial-sli...
In our new blog post, @antoineds.bsky.social describes how EDRs leverage MacOS Network Extension to detect C2s and how to bypass this kind of detection using Mythic Apfell as an example.
#redteam
blog.balliskit.com/when-osascri...
In our new blog post, @antoineds.bsky.social describes how EDRs leverage MacOS Network Extension to detect C2s and how to bypass this kind of detection using Mythic Apfell as an example.
#redteam
blog.balliskit.com/when-osascri...
MacroPack, ShellcodePack, and DarwinOps all come with bypass presets for major EDRs and Antivirus
Those presets are regularly updated and tested!
If you want to see a demo or an equivalent screenshot for the major EDRs contact us !
#redteam
MacroPack, ShellcodePack, and DarwinOps all come with bypass presets for major EDRs and Antivirus
Those presets are regularly updated and tested!
If you want to see a demo or an equivalent screenshot for the major EDRs contact us !
#redteam
To help with static analysis detection by EDR,
ShellcodePack implements a method to load a shellcode from a separate file or from an URL
This tutorial explains how to use that option!
#redteam
blog.balliskit.com/loading-a-sh...
To help with static analysis detection by EDR,
ShellcodePack implements a method to load a shellcode from a separate file or from an URL
This tutorial explains how to use that option!
#redteam
blog.balliskit.com/loading-a-sh...
You can use DarwinOps to weaponize a Mythic C2 implant for MacOS and bypass EDRs!
Checkout this blog Post by @antoinedss
#redteam
blog.balliskit.com/setup-and-we...
You can use DarwinOps to weaponize a Mythic C2 implant for MacOS and bypass EDRs!
Checkout this blog Post by @antoinedss
#redteam
blog.balliskit.com/setup-and-we...
We now support packages build with tools like Costura!
We tested we could obfuscate SharpHound, KrbRelay, and Mythic Apollo agent
We now support packages build with tools like Costura!
We tested we could obfuscate SharpHound, KrbRelay, and Mythic Apollo agent
Well with the new version, MacroPack Pro is now also a powerful assembly obfuscation/weaponization tool ! 😎
We wrote a tutorial about that here:
blog.balliskit.com/obfuscation-...
Well with the new version, MacroPack Pro is now also a powerful assembly obfuscation/weaponization tool ! 😎
We wrote a tutorial about that here:
blog.balliskit.com/obfuscation-...
blog.balliskit.com/dll-hijackin...
blog.balliskit.com/dll-hijackin...
Example with Mimikatz!
#redteam
Example with Mimikatz!
#redteam
#redteam
Watch the talk here:
youtu.be/bA2p27gQK4M?...
#redteam
Watch the talk here:
youtu.be/bA2p27gQK4M?...