Ryukk33's Offensive Dev Journey
CtrlK
Support me here ❤️
  • ☣️Welcome !!
    • 🔎Whoami
    • 💡Why you should use Go for your offensive development tasks
  • ⚙️Basics
    • 🐚Quick and Dirty: gather shellcode from a previously generated executable
    • 💉Create your own basic Go stub
    • 🪄Understand AVs static detection (and basic obfuscation)
    • 🪟Windows API confidence abuse basics
  • Shellcode Obfuscation
    • Why Shellcode Obfuscation Matters ?
    • 🐚Unusual Shellcode Encoding: Convert Shellcode to IPv4
    • 🐚Unusual Shellcode Encoding: Insult-based Shellcode Obfuscation
  • Process injection and memory manipulation
    • Inject shellcode in the memory of a new suspended process
    • Inject shellcode in the memory of a currently running process
    • Process Hollowing: The skinwalker process
  • Runtime stealthness
    • Low-level APIs, APC, and Memory Protection Techniques
    • PPID Spoofing
Powered by GitBook
On this page
  1. ☣️Welcome !!

🔎Whoami

  • French cybersec student 🇫🇷🐔

  • 27 y.o

  • CTF Player @ 175 ❤️

  • Pentester @ MaCyber ️⚔️

  • Bug Hunter @ YesWeHack 🕵️‍♂️🔍

  • Offensive development enthusiast ☣️

  • You can support me at https://buymeacoffee.com/ryukk33 ❤️

PreviousWelcome !!NextWhy you should use Go for your offensive development tasks

Last updated 9 months ago