Developing Cobalt Strike BOFs with Visual Studio

Introduction Cobalt Strike beacon object files (BOFs) is a feature that was added to the beacon in order to allow rapid beacon extendibility in a more OPSEC way…Read more...

Blogs

  • Developing Cobalt Strike BOFs with Visual Studio

    Introduction Cobalt Strike beacon object files (BOFs) is a feature that was added to the beacon in order to allow rapid beacon extendibility in a more OPSEC way. The BOF file is a common object file format (COFF) object that will be loaded and executed in the same process as the beacon, and therefore eliminates the…Read more...

  • Android adb reverse tethering mitm setup

    Introduction Traditionally, to inspect traffic for Android apps, the mobile phone and the security analyst’s PC are connected to the same Wi-Fi hotspot. The proxy settings on the mobile phone are configured to point to the analyst’s PC. Typically, an intercepting software such as Burp Suite Pro is configured on the PC…Read more...

  • Android adb reverse tethering mitm setup revised

    Introduction In a previous blogpost, I've written how to combine Gnirehtet & proxychains in order to intercept traffic from mobile apps over adb while on a VPN. After some time, the setup seemed to be somewhat buggy and slow. A contact of @FSDominguez suggested to look into port forwarding. I'd like to present a…Read more...

  • Scanning incomplete C# projects for vulnerable code patterns

    At Securify Inline, we are always looking for smart techniques to support our security code review process. We want to find certain insecure patterns in our client's code, using static analysis. For our C# projects, we developed a custom scanner, based on the Roslyn parser. This article discusses what problems we ran…Read more...

  • Using Semgrep to assist in security code reviews

    Semgrep is a static code analysis tool that finds patterns in source code. At Securify Inline we use semgrep to assist in our security code reviews, and to detect issues as soon as they occur in the code. Introduction At Securify Inline we regularly review our client's code. Every week we check the code that the client…Read more...

Questions or feedback?

Call usphone
Mail usmail