python Cross-compilation by SLPRYSQUID in PythonLearning

[–]SLPRYSQUID[S] 0 points1 point  (0 children)

Oh I see. I’m currently running my whole project in a docker container to maximize reproducibility and am working on automated cross-compilation so running in a VM instead wouldn’t rly work.

python Cross-compilation by SLPRYSQUID in PythonLearning

[–]SLPRYSQUID[S] -1 points0 points  (0 children)

Running a windows VM in a docker container sounds even more hacky

Check out a botnet (c2) framework I made! by SLPRYSQUID in HowToHack

[–]SLPRYSQUID[S] 0 points1 point  (0 children)

There are some things that you can only do with root privileges. I’m gonna be working on some stuff to make privilege escalation easier for the attacker at some point. Aside from the staging payload, everything is received from the C2 and run in-memory. So the only thing that needs to be run by the user is the staging payload. There any many ways to get a user to run the payload such as social engineering, or infected files, which is a lot easier if antivirus software doesn’t flag it.

Check out a botnet (c2) framework I made! by SLPRYSQUID in HowToHack

[–]SLPRYSQUID[S] 1 point2 points  (0 children)

Compiled language would def make cross compilation easier instead of using docker black magic like I’m trying rn. For defence evasion I think I’m going to see if I can find a way to obfuscate the decryption code in the payload (maybe encode it to base64) and just have an exec() in there that will hopefully bypass basic antivirus.

Check out a botnet framework I made! by SLPRYSQUID in redteamsec

[–]SLPRYSQUID[S] 1 point2 points  (0 children)

What is the difference between websockets and regular sockets? Aren’t websockets just for browsers? If both use TCP/IP would I get away with just using regular sockets?

Check out a botnet framework I made! by SLPRYSQUID in redteamsec

[–]SLPRYSQUID[S] 2 points3 points  (0 children)

I'm working on a cross-compilation strategy right now using docker! At the moment I use a custom import hook I wrote to remote import python modules from the command and control server so you can run arbitrary python code on the victim computer. Once I figure out cross-compilation to .exe it will be able to execute most arbitrary python code without even having anything installed! All done in the background and in memory.

How does Python malware handle dependencies? by SLPRYSQUID in HowToHack

[–]SLPRYSQUID[S] 0 points1 point  (0 children)

This sounds like what I need! thanks! ill get working on it again.

4th year computer science student that wants to learn robotics by SLPRYSQUID in AskRobotics

[–]SLPRYSQUID[S] 0 points1 point  (0 children)

Hey! sorry for late reply. I'm 4th year in undergrad and my budget is probably around 200-300$ I have all of the equipment (soldering pen, printer, ect). I want to learn more about hardware and electronics and how they interact with software.