Ryukk33's Offensive Dev Journey
CtrlK
Support me here ❤️
  • ☣️Welcome !!
    • 🔎Whoami
    • 💡Why you should use Go for your offensive development tasks
  • ⚙️Basics
    • 🐚Quick and Dirty: gather shellcode from a previously generated executable
    • 💉Create your own basic Go stub
    • 🪄Understand AVs static detection (and basic obfuscation)
    • 🪟Windows API confidence abuse basics
  • Shellcode Obfuscation
    • Why Shellcode Obfuscation Matters ?
    • 🐚Unusual Shellcode Encoding: Convert Shellcode to IPv4
    • 🐚Unusual Shellcode Encoding: Insult-based Shellcode Obfuscation
  • Process injection and memory manipulation
    • Inject shellcode in the memory of a new suspended process
    • Inject shellcode in the memory of a currently running process
    • Process Hollowing: The skinwalker process
  • Runtime stealthness
    • Low-level APIs, APC, and Memory Protection Techniques
    • PPID Spoofing
Powered by GitBook
Page cover
On this page

☣️Welcome !!

Welcome to my blog ! The goal of it is to share my offensive development journey with the community.

The content in here will be primary focused on offensive development targeting windows environment, defense evasion and obfuscation. I hope my research work can help, enjoy !

This blog is still a work in progress, it will be updated in a timely manner.

NextWhoami

Last updated 9 months ago