{"id":26201,"date":"2022-07-27T13:11:05","date_gmt":"2022-07-27T13:11:05","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=26201"},"modified":"2022-07-27T13:11:06","modified_gmt":"2022-07-27T13:11:06","slug":"frostbyte","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/frostbyte\/","title":{"rendered":"Frostbyte : FrostByte Is A POC Project That Combines Different Defense Evasion Techniques"},"content":{"rendered":"\n<p><strong>FrostByte<\/strong> Is A POC Project That Combines Different Defense Evasion Techniques. In the past few days I&#8217;ve been experimenting with the&nbsp;AppDomain manager injection&nbsp;technique had a decent success with it in my previous Red Team engagements against certain EDRs. Although, this is really good for initial access vector, I wanted to release a POC which will help hiding your shellcode elsewhere. No more shellcode embedded DLL files!<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/frostbyte#the-problem\"><\/a>The Problem!<\/h2>\n\n\n\n<p>Although it is an excellent technique when used independently, but when coupled with a delivery technique like sending a C# ClickOnce inside an ISO\/ZIP\/VHD\/VHDX file. The real problem is 1 out of 10 times the DLL for the appdomain was detected by AI\/ML heurestics of the AV\/EDR. This is because the DLL file needs to be dropped on the disk before initializing the appdomain. Ignoring the remote DLL loads for the time being (UNC paths in .config), the DLL for the appdomain would contain the shellcode and I strongly felt that is the reason for a probable static detection, because the rest of the code which is WINAPI calls can be dynamically resolved and pretty well obfuscated.<\/p>\n\n\n\n<p>I wanted to enhance this technique in terms of minimizing what the DLL would initially hold. I started by dropping encrypted shellcode in a separate file on disk along with the injector DLL but then I came across this amazing blog from Checkpoint on&nbsp;<a href=\"https:\/\/research.checkpoint.com\/2022\/can-you-trust-a-files-digital-signature-new-zloader-campaign-exploits-microsofts-signature-verification-putting-users-at-risk\/\">Zloader&#8217;s Campaign<\/a><\/p>\n\n\n\n<p>TLDR version: We can embed arbitrary data into some fields within the PE in a way that would not break the files Signature. So our data will get embedded and the exe will still remain digitally signed.<\/p>\n\n\n\n<p>More info on this &#8211;&nbsp;https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digitally-Signed-Executable-wp.pdf<\/p>\n\n\n\n<p>So the idea is to embed an encrypted shellcode stub into a known signed executable and still manage to keep it signed like how the Zloader malware did. By doing so the AppDomain Manager DLL will no longer contain the shellcode within itself, but will just have the logic to parse the shellcode from the PE binary that loads it to decrypt and execute as a seperate thread. Doing this might decrease the static detection rate for the DLL while your shellcode is nicely placed inside a signed binary.<\/p>\n\n\n\n<p>I was trying to achieve this by manually tampering with the ZLoader samples I got from VirusTotal, but later found about a project which had already implemented all of these techniques pretty well &#8211;&nbsp;Sigflip. In this POC I leveraged Sigflip&#8217;s loader code to build the AppDomain DLL and SigFlip injector to embed the encrypted shellcode into our C# exe.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/frostbyte#advantages\"><\/a>Advantages<\/h2>\n\n\n\n<p>Large blobs of shellcode like Cobalt Strike&#8217;s Stageless shellcode will no longer reside on an unsigned DLL on disk, irrespective of the obfuscation \/ encoding techniques used. The DLL is cleaner, smaller and stealthier with minimal code thereby reducing the changes of detection.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/frostbyte#working\"><\/a>Working<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjETOhQvcxrnM1NGo02ZqXG3kN6fMjTJh7048Y4DM9AMuopfdd1gh_cw1gVd2fHI0shgCfHgtY6I-Oq0a1amuUKz95FR3B8LnmeWx_r06qdiHEtG2B2VhfUN2Yt_4sCdHxiDSq0-Jvd4odrwF25oY7DAvKAas-2s3eHpwtABKVx0tK3dTmqAH7bg3He\/s620\/diagram.png\" alt=\"\" \/><\/figure>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Steps to build Signed Shellcode Executable<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Pick any x64 Signed C# binary of your choice, a binary within which you would like cobalt strike beacon to reside and execute: E.g.: CasPol.exe etc.<\/li><li>Generate your Cobalt Strike Stageless Shellcode &#8211; x64-stageless.bin<\/li><li>Place both of them into a folder where&nbsp;SigFlip&nbsp;is also present and run the below command:<br><code><strong>SigFlip.exe -i \"Z:\\ZLoader\\CasPol.exe\" \"Z:\\ZLoader\\x64-stageless.bin\" \"Z:\\ZLoader\\update.exe\" \"S3cretK3y\"<\/strong><\/code><\/li><li>Thanks to SigFlip now you have a (windows signed?) binary named&nbsp;<code><strong>update.exe<\/strong><\/code>&nbsp;which will be a digitally signed PE with encrypted shellcode embedded in it.<\/li><\/ul>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/pwn1sher\/frostbyte#steps-to-build-the-appdomain-loader-dll\"><\/a>Steps to build the AppDomain Loader DLL<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Take the C# Template Code from&nbsp;here<\/li><li>Replace your encryption secret key with the one you chose while running SigFlip at Line:163 (you might have to adjust a few bytes to confirm if your CS shellcode is properly decrypted)<\/li><li>Replace with the binary path at Line:146<\/li><li>Change the log file paths in lines: 158,165<\/li><li>Compile the code as DLL using the following command &#8211;&nbsp;<code><strong>csc \/target:library \/out:test.dll test.cs<\/strong><\/code><\/li><li>Place the compiled DLL and the&nbsp;update.exe.config&nbsp;file in same folder where your signed shellcode exe was placed.<\/li><li>Execute update.exe.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/pwn1sher\/frostbyte\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>FrostByte Is A POC Project That Combines Different Defense Evasion Techniques. In the past few days I&#8217;ve been experimenting with the&nbsp;AppDomain manager injection&nbsp;technique had a decent success with it in my previous Red Team engagements against certain EDRs. Although, this is really good for initial access vector, I wanted to release a POC which will [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5483,5481,5482],"class_list":["post-26201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-defense-evasion","tag-frostbyte","tag-poc-project"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Frostbyte : FrostByte Is A POC Project That Combines Different Defense<\/title>\n<meta name=\"description\" content=\"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Frostbyte : FrostByte Is A POC Project That Combines Different Defense\" \/>\n<meta property=\"og:description\" content=\"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-27T13:11:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-27T13:11:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Frostbyte : FrostByte Is A POC Project That Combines Different Defense Evasion Techniques\",\"datePublished\":\"2022-07-27T13:11:05+00:00\",\"dateModified\":\"2022-07-27T13:11:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\"},\"wordCount\":689,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\",\"keywords\":[\"Defense Evasion\",\"Frostbyte\",\"POC Project\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\",\"name\":\"Frostbyte : FrostByte Is A POC Project That Combines Different Defense\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\",\"datePublished\":\"2022-07-27T13:11:05+00:00\",\"dateModified\":\"2022-07-27T13:11:06+00:00\",\"description\":\"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/frostbyte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png\",\"width\":\"728\",\"height\":\"757\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Frostbyte : FrostByte Is A POC Project That Combines Different Defense","description":"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/frostbyte\/","og_locale":"en_US","og_type":"article","og_title":"Frostbyte : FrostByte Is A POC Project That Combines Different Defense","og_description":"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .","og_url":"https:\/\/kalilinuxtutorials.com\/frostbyte\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-07-27T13:11:05+00:00","article_modified_time":"2022-07-27T13:11:06+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Frostbyte : FrostByte Is A POC Project That Combines Different Defense Evasion Techniques","datePublished":"2022-07-27T13:11:05+00:00","dateModified":"2022-07-27T13:11:06+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/"},"wordCount":689,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","keywords":["Defense Evasion","Frostbyte","POC Project"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/frostbyte\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/","url":"https:\/\/kalilinuxtutorials.com\/frostbyte\/","name":"Frostbyte : FrostByte Is A POC Project That Combines Different Defense","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","datePublished":"2022-07-27T13:11:05+00:00","dateModified":"2022-07-27T13:11:06+00:00","description":"FrostByte Is a POC Project That Combines Different Defense Evasion Techniques. In the past few days been experimenting with the AppDomain .","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/frostbyte\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/frostbyte\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","width":"728","height":"757"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbTIJmBX5J2OZDT4x_wj7lz89r9bxwYjCOWvU7UcvTXJyjIYopJG9VOxo0b-UDBQxy3PgE5VCOPZnhynzW3dvR9YDpaNB9IVncRI9_SmQRhSoyUGzDeH4jk1uO6DWnwVCdBwWO7GciE1ZDA5X3GUqZ0Rhe8DMEmMJd-jcTc7j2BjyiuzY6Q4-vIDTu\/s757\/diagram%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":24881,"url":"https:\/\/kalilinuxtutorials.com\/shhhloader\/","url_meta":{"origin":26201,"position":0},"title":"Shhhloader : SysWhispers Shellcode Loader","author":"R K","date":"May 28, 2022","format":false,"excerpt":"Shhhloader is a SysWhispers Shellcode Loader that is currently a Work in Progress. It takes raw shellcode as input and compiles a C++ stub that has been integrated with SysWhispers in order to bypass AV\/EDR. The included python builder will work on any Linux system that has Mingw-w64 installed. The\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg6hnLADNxxkI70NALQu38dtY_oqJXHED0XbW9Igs7onIJ8syEhWm6PFRXrbuW22lXvD5oI8tblPGzKa9Mq8kjzEoANDXj2w6eun7RhgVmMVhUi-V4z0iFt2IbjUzUI8bvKIUCEfe8uclUAe7zG9wsmEMY8ss948codiGveesYSxJs1QQz_0ggHGFC7\/s728\/mqdefault.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg6hnLADNxxkI70NALQu38dtY_oqJXHED0XbW9Igs7onIJ8syEhWm6PFRXrbuW22lXvD5oI8tblPGzKa9Mq8kjzEoANDXj2w6eun7RhgVmMVhUi-V4z0iFt2IbjUzUI8bvKIUCEfe8uclUAe7zG9wsmEMY8ss948codiGveesYSxJs1QQz_0ggHGFC7\/s728\/mqdefault.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg6hnLADNxxkI70NALQu38dtY_oqJXHED0XbW9Igs7onIJ8syEhWm6PFRXrbuW22lXvD5oI8tblPGzKa9Mq8kjzEoANDXj2w6eun7RhgVmMVhUi-V4z0iFt2IbjUzUI8bvKIUCEfe8uclUAe7zG9wsmEMY8ss948codiGveesYSxJs1QQz_0ggHGFC7\/s728\/mqdefault.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg6hnLADNxxkI70NALQu38dtY_oqJXHED0XbW9Igs7onIJ8syEhWm6PFRXrbuW22lXvD5oI8tblPGzKa9Mq8kjzEoANDXj2w6eun7RhgVmMVhUi-V4z0iFt2IbjUzUI8bvKIUCEfe8uclUAe7zG9wsmEMY8ss948codiGveesYSxJs1QQz_0ggHGFC7\/s728\/mqdefault.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31770,"url":"https:\/\/kalilinuxtutorials.com\/dllnotificationinjection\/","url_meta":{"origin":26201,"position":1},"title":"DllNotificationInjection &#8211; Exploring A Novel Threadless Process Injection Technique","author":"Varshini","date":"January 22, 2024","format":false,"excerpt":"DllNotificationInection is a POC of a new \u201cthreadless\u201d process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes. An accompanying blog post with more details is available here How It Works? DllNotificationInection works by creating a new\u00a0LDR_DLL_NOTIFICATION_ENTRY\u00a0in the remote process. It inserts\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjv_r38XfOMRi4FEYOA4cNceuk8QXqPDDmTDzxlE7F-4uzv7gWjqhqhh8UUS0eyP0MfdOeH2s0okAy3EtQgdfV4MZZTbyqk_UB6MRzNg2U59WRth-nJZe678Bdx4fLMhcQEAYug1028GhZGprcnA4SBrWkdH5OYjcsXxHYYE-6XfD69et1FHck6THzYElr_\/s16000\/Untitled%20design.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35413,"url":"https:\/\/kalilinuxtutorials.com\/hooka\/","url_meta":{"origin":26201,"position":2},"title":"Hooka : Advanced Shellcode Loader Generation With Enhanced Evasion Techniques","author":"Varshini","date":"December 9, 2024","format":false,"excerpt":"Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on other tools like BokuLoader, Freeze or Shhhloader, and it tries to implement more evasion features. Why in Golang? Why not? Features This tool is able to generate loaders with this features: Multiple shellcode injection techniques:\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31612,"url":"https:\/\/kalilinuxtutorials.com\/process-stomping\/","url_meta":{"origin":26201,"position":3},"title":"Process Stomping: Advanced Technique for Executing Shellcode in Targeted Executable Sections","author":"Varshini","date":"January 3, 2024","format":false,"excerpt":"Cybersecurity is a field that is always changing, and new techniques are always being made to improve both offensive and defensive tactics. Process Stomping is an improved version of Process Overwriting that was first used by Aleksandra Doniec (hasherezade) and is now being studied by others in the field. This\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg-Eg_9ejZ7fixftgQoVHJATI8l1-0bmwfQyvO50al1FMY4gYIuhiNzsOlbY7ZHnsxa9ZALa1UmId7_hE_f2CpKF0B6d1ixzglqGd1Dgz_mpYP9ZaZE18IQ_uofp6oICmUDPU6ryfQZ8ecQSULA2RwDSK-bW9FHLf32cmxdqGf2A5UsPCyXULMfboEwsQ\/s16000\/Process%20Stomping.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30395,"url":"https:\/\/kalilinuxtutorials.com\/caro-kann\/","url_meta":{"origin":26201,"position":4},"title":"Caro Kann &#8211; Evading Kernel Scans with Encrypted Shellcode","author":"Varshini","date":"September 20, 2023","format":false,"excerpt":"In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils the \"Caro Kann Defense\"\u2014a savvy technique designed to evade memory scans, drawing inspiration from the world of chess. Dive in to uncover the strategy behind this stealthy approach. Encrypted shellcode\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVjhggk7xP1DtRswgxeEZ7AG8BhenreH0gAAzHqgUEeEfIn4-PrK4HzABUYTkfZIcO7S1o08AC961MNbRVAUT0Ut8MPiNXnEziMRkVuXihd5pRUM-yaBkej0fnqz6wYYHHcDSQTLBTszomb2eSSko3c-pAEhYBJdinKEDiHtkiq27tA-BpTqtYP6SOCQ\/s16000\/caro%20kaan.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24086,"url":"https:\/\/kalilinuxtutorials.com\/reflexxion\/","url_meta":{"origin":26201,"position":5},"title":"RefleXXion : A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV\/EPP\/EDR Etc","author":"R K","date":"April 21, 2022","format":false,"excerpt":"RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV\/EPP\/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array. After that, there are two techniques that the user can\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxHBcr1Ouk6HEgInjIi8cGN5TFpFpkPg1CO45Lc-l3OXMn0-iAzRFzFjvt6kkH4OHoH215_aYQ0uaEHMRLZMNg4mD2dXsLCsJfndRQrTJrYXoapes1r5gmidHPrimicfM2Fx0n30zmut1ex_vB6jDAMNoGZNIk5pE0eDV1xgTTPeqrLFF-EAHZCB4U\/s728\/reflexxion%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxHBcr1Ouk6HEgInjIi8cGN5TFpFpkPg1CO45Lc-l3OXMn0-iAzRFzFjvt6kkH4OHoH215_aYQ0uaEHMRLZMNg4mD2dXsLCsJfndRQrTJrYXoapes1r5gmidHPrimicfM2Fx0n30zmut1ex_vB6jDAMNoGZNIk5pE0eDV1xgTTPeqrLFF-EAHZCB4U\/s728\/reflexxion%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxHBcr1Ouk6HEgInjIi8cGN5TFpFpkPg1CO45Lc-l3OXMn0-iAzRFzFjvt6kkH4OHoH215_aYQ0uaEHMRLZMNg4mD2dXsLCsJfndRQrTJrYXoapes1r5gmidHPrimicfM2Fx0n30zmut1ex_vB6jDAMNoGZNIk5pE0eDV1xgTTPeqrLFF-EAHZCB4U\/s728\/reflexxion%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxHBcr1Ouk6HEgInjIi8cGN5TFpFpkPg1CO45Lc-l3OXMn0-iAzRFzFjvt6kkH4OHoH215_aYQ0uaEHMRLZMNg4mD2dXsLCsJfndRQrTJrYXoapes1r5gmidHPrimicfM2Fx0n30zmut1ex_vB6jDAMNoGZNIk5pE0eDV1xgTTPeqrLFF-EAHZCB4U\/s728\/reflexxion%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=26201"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26201\/revisions"}],"predecessor-version":[{"id":26357,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26201\/revisions\/26357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/26205"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=26201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=26201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=26201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}