Nov. 29, 2023, 4:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

As Red Teamers, we need an OPSEC safe method to execute shellcode via a range of initial access vectors. Things are getting more and more difficult with Endpoint and Detection (EDR) products improving, making it more challenging to get an implant.


This post is going to present a slightly new method for bypassing EDR, commonly known as CreateThreadPoolWait. However, instead of using kernel32.dll we will use ntdll.dll.


 GitHub: https://github.com/nettitude/Tartarus-TpAllocInject


The loader published above uses the the bypass technique …

access detection edr endpoint forensics implant initial access loader making operations opsec products red team red team operations safe shellcode team things

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US