AngelystorUsing SSL Certificates for Red Team PayloadsThis idea came out when I was musing about giving the blue team something different to look at. In a stock or minimal Linux box, there…6 min read·Nov 12, 2023----
AngelystorUnderstanding TCCTCC (Transparency, Consent and Control), is built into MacOS as a means to protect sensitive user data from access by applications. The…12 min read·Jul 11, 2023----
AngelystorPhishing with Evilginx2Evilginx 2 is this super cool proxy framework that helps hardworking red teamers do phishing with ease. Gone are the days where you would…7 min read·Jul 10, 2023--2--2
AngelystorUsing RASP to look for evil in Java programsWelcome to Part 2 of my previous post on loading a Java class in Tomcat. A possible way to stop this kind of attack would be to dynamically…4 min read·Jun 24, 2023----
AngelystorDynamically loading Java implant from a remote source to TomcatI had a situation where I could do JNDI injection into a Tomcat server leading to RCE. While off the shelf solutions such as this Github…7 min read·Jun 4, 2023----
AngelystorReversing an enterprise Golang applicationRecently I needed to reverse engineer an application as I needed to figure out its login mechanisms. The diagram below is a high level…12 min read·May 30, 2023----
AngelystorinCSG @ GovTechWhen You Have No Money and Want to Find Bugs in RoutersEmulating Embedded Devices for Vulnerability Research11 min read·Jan 5, 2022----
AngelystorinCSG @ GovTechWhy doesn’t my shellcode work anymore?Shellcode run on different versions of Linux kernels behave differently!4 min read·Jul 14, 2021----
AngelystorTroubleshooting Program Stability using DynamoRIOProgram stability is somewhat different with regards to fuzzing versus how we generally perceive it.6 min read·Mar 30, 2021----