@joehowwolf Profile picture

William Burgess

@joehowwolf

Ex-theoretical physicist, currently terrible hacker and wannabe security researcher. Views are, regrettably, my own. Likes = bookmarks

Joined September 2014
Similar User
Lee Chagolla-Christensen photo

@tifkin_

Matt Hand photo

@matterpreter

Pavel Yosifovich photo

@zodiacon

Ryan Cobb photo

@cobbr_io

Outflank photo

@OutflankNL

Cody Thomas photo

@its_a_feature_

mgeeky | Mariusz Banach photo

@mariuszbit

Josh photo

@passthehashbrwn

Dwight Hohnstein photo

@djhohnstein

Chris Thompson photo

@retBandit

Jonny Johnson photo

@jsecurity101

Cobalt Strike photo

@_CobaltStrike

Stan Hegt photo

@StanHacked

Carsten photo

@0xcsandker

sinusoid photo

@the_bit_diddler

Pinned

Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: labs.withsecure.com/blog/spoofing-… PoC: github.com/countercept/Ca…


William Burgess Reposted

New blog: Get details on recent changes, upcoming plans for #CobaltStrike R&D, and our strategy for increased communication. cobaltstrike.com/blog/cobalt-st…

Tweet Image 1

New CS Blog - Revisiting the UDRL Part 3: cobaltstrike.com/blog/revisitin… If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest 👀


William Burgess Reposted

The video just went live for my recent @BlueHatIL talk about a new Windows vulnerability class, including an exploit for kernel code execution 👇 youtube.com/watch?v=1LvOFU…


When I was a sec consultant, one of my favourite days was when a new CS dropped and there were plenty of goodies to play with. A lot of effort went into this release and there is a looot of cool stuff to hack around with

This post is unavailable.

William Burgess Reposted

collection of kCTF exploits. not just exploit source, but documentation about the bug and documentation about how the exploit works. very cool stuff, and some really creative people out there



William Burgess Reposted

I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver. blog.slowerzs.net/posts/pplsyste…


This will be siiiiick, now want a recon ticket

Are you tired of being stuck in userland? Come to @reconmtl where I'll show you how to fast-talk your way into the Windows kernel. Coffee and exploits provided. Come for the pwnage. Stay for the knowledge. cfp.recon.cx/recon2024/talk…

Tweet Image 1


William Burgess Reposted

Today, we're disclosing an overlooked, wide-impact bug/attack vector affecting the Windows/COM ecosystem, dubbed #MonikerLink. In Outlook, the bug's impact is far and wide: from leaking NTLM creds to RCE. The same issue may exist in other software, too. research.checkpoint.com/2024/the-risks…


William Burgess Reposted

super hot technique for preventing EDR dll loaded into the process from Marcus Hutchins (malwaretech): malwaretech.com/2024/02/bypass… just tested it successfully ;)


William Burgess Reposted

Working on a pretty scary project. I combined @C5pider Stardust and @joehowwolf recent work LLVM obfuscation work. ENDLESS_WALTZ produces unique PIC .bin's each time it's ran (== unique agents each compile...) L is normal Stardust, M+R are the same code but different runs of EW

Tweet Image 1

William Burgess Reposted

Have you ever wanted to mutate Beacon Object Files? @joehowwolf and I have created a mutator kit that allows you to easily mutate Cobalt Strike sleep masks or BOFs in general. cobaltstrike.com/blog/introduci…


Sick work!

I'm exited to release GraphStrike, a project I completed during my internship at @RedSiege Route all of your Cobalt Strike HTTPS traffic through graph.microsoft.com. Tool: github.com/RedSiege/Graph… Dev blog: redsiege.com/blog/2024/01/g… #redteam #infosec #Malware #Microsoft

Tweet Image 1


William Burgess Reposted

“A thin, thin brew - a man might drink himself into a dropsy before the stuff raised his spirits even half a degree.” Jack Aubrey on American coffee


Very nice work!

LLVM-Yx-CallObfuscator: An LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time. github.com/janoglezcampos…



William Burgess Reposted

We also have a (draft) pull request in the queue for a @metasploit exploit module against Ivanti Connect Secure (CVE-2023-46805 and CVE-2024-21887): github.com/rapid7/metaspl…

Tweet Image 1

This is very cool

In this follow up from his article in May, @SBousseaden digs deeper into call stacks! See how Elastic Security 8.11 further increases efficacy against in-memory threats: go.es.io/47vnlPZ



William Burgess Reposted

And then he bought Twitter and created here a problem with the ads that is very much worse than the already bad (or maybe better say very bad?) problem with the ads on YouTube. Congrats, fantastic work. 👏👏👏 Fuck @elonmusk

Tweet Image 1

William Burgess Reposted

I have posted the slides for the #BlackHat talk @chompie1337 and I gave yesterday -> Close encounters of the advanced persistent kind: Leveraging rootkits for post-exploitation github.com/FuzzySecurity/…

Tweet Image 1

New Cobalt Strike blog by @HenriNurmi - Simplifying BOF Development: Debug, Test, and Save Your B(e)acon cobaltstrike.com/blog/simplifyi… All in VS BOF template available in latest Arsenal kit release!


Loading...

Something went wrong.


Something went wrong.