Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

0xBugatti/myAwesome

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

5 Commits

Repository files navigation

Awesome CETP

Cource Lab

lab

Useful Resources

Resources and Tools

API Hashing

EDR Projects

Testing Tools

Evasion Tools

Blocker Tools

Blogs

Writeups & POCs

BYOSI

Kernel Drivers

Cource Syllbus

Windows Internals

  • Understand User-mode and Kernel-mode presentation of a process.
  • Understand PE structure.
  • Understand User-mode and Kernel-mode separation and execution flow using IDA Pro and WinDbg.

EDR Internals

  • Reversing EDR's internals using IDA Pro and WinDbg.
  • Understand how EDR's telemetries are collected.

Static Detection Bypass

  • Using obfuscators & code virtualization to protect code against:
  • Static detection
  • Analyzing
  • Reverse-engineering

Initial Access Techniques

  • Signed ClickOnce Backdooring.

Introduction to Windows Kernel Programming

  • Understand how a process can communicate with a driver from userland.
  • Create a user-mode code that sends and receives data from a kernel driver.

Road to Kernel

  • Reversing R/W kernel primitive vulnerable drivers and exploiting them to:
  • Load unsigned code into the kernel using IDA Pro.
  • Learn methodologies to:
  • Hunt for leaked certificates.
  • Leverage outdated certificates to sign a rootkit.

EDR Killing

  • Learn methodologies to hunt for signed killer drivers.
  • Reverse multiple killer drivers using IDA Pro.
  • Learn how to exploit killer drivers to kill EDR processes.
  • Write a custom killer rootkit.

Attack on EDR's Kernel Callbacks

  • Understanding & reversing kernel callbacks using WinDbg and IDA Pro.
  • Understanding:
  • What telemetry kernel callbacks collect.
  • The purpose of collected telemetry.
  • Writing a user-mode code and kernel driver toolkit to:
  • Enumerate and remove kernel callbacks.
  • Exploiting R/W kernel primitive vulnerable drivers to enumerate and remove kernel callbacks.

Attack on ETW

  • Understanding & reversing ETW internals.
  • Disabling ETW providers.

PP & PPL Bypass

  • Understanding & reversing process protection levels using WinDbg.
  • Exploiting R/W kernel primitive vulnerable drivers to manage a process's protection level.
  • Writing a user-mode code and kernel driver toolkit to:
  • Manage process protection levels.
  • Dumping LSA-protected LSASS.

Extra Offensive Rootkit Techniques

  • Hiding:
  • Processes/drivers from analysts and user-mode processes.
  • Kernel functions from the Import Address Table.
  • Learning efficient dynamic kernel offset resolution.

C2 Traffic Tunneling

  • Writing a data exfiltration tool that hides malicious traffic inside multiple trusted APIs, such as Slack.

Block EDR's Traffic

  • Discovering and coding multiple ways to prevent EDR processes from sending alerts to SOC management consoles.

ASR Rules Bypass

  • Reversing ASR rules and bypassing them.

Attack on Sysmon

  • Understanding & reversing Sysmon.
  • Discovering and coding multiple ways to blind Sysmon.

UAC Bypass

  • Discovering multiple ways to bypass Windows User Account Control.

Anti-Analysis

  • Discovering and coding multiple techniques for:
  • Anti-Debugging
  • Anti-Disassembling
  • Anti-Virtualization
  • Anti-Sandbox
  • Anti-Code Injection

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

AltStyle によって変換されたページ (->オリジナル) /