Advertisement ยท 728 ร— 90

Posts by ege

โ”ฌโ”ดโ”ฌโ”ดโ”คแด‡ษขแด‡.๊œฑสœโ”œโ”ฌโ”ดโ”ฌโ”ด

New website (๏พ‰โ—•ใƒฎโ—•)๏พ‰*:ใƒป๏พŸโœง ege.sh

4 weeks ago 0 0 0 0
Post image

#flareon12 ๐Ÿฅฒ

5 months ago 3 0 0 0
Video
8 months ago 0 0 1 0
Preview
GitHub - EgeBalci/evilreplay: Seamless remote browser session control Seamless remote browser session control. Contribute to EgeBalci/evilreplay development by creating an account on GitHub.

As a fun little weekend project, I have weaponized OpenReplay for exploiting XSS on "HttpOnly" websites. It allows you to remotely control a victim's browser without the need for stealing any cookies.

github.com/EgeBalci/evi...

8 months ago 1 0 1 0

Heading to London next week for Infosecurity Europe (3-5 June). If you're around and fancy grabbing a coffee or a beer after the exhibit, hit me up.

10 months ago 0 0 0 0
Preview
GitHub - EgeBalci/go at release-branch.go1.24-opsec The Go programming language. Contribute to EgeBalci/go development by creating an account on GitHub.

Wrote a linker patch for mangling pclntab and removing build info from Golang binaries ๐Ÿ™ƒ

github.com/EgeBalci/go/...

10 months ago 2 0 0 0
Post image

An unidentified individual has leaked the internal chats of the BlackBasta ransomware group

x.com/PRODAFT/stat...

1 year ago 14 5 0 0
Post image

Finally finished #flareon11 ๐Ÿฅฒ Lost a lot of time AND SANITY on question 9. Learned a lot and had fun as always.

1 year ago 2 0 1 0
Advertisement
.:: Phrack Magazine ::. Phrack staff website.

Phrack #71 is ONLINE! ๐Ÿ”ฅ๐Ÿ”ฅ
This is literally a dream come true. My article โ€œEvasion by De-Optimizationโ€ got accepted into PHRACK 71! It is such an honor to be considered. I still canโ€™t wrap my head around the fact that my work has been published among the legends.

phrack.org/issues/71/1....

1 year ago 0 0 0 0
Preview
GitHub - EgeBalci/deoptimizer: Evasion by machine code de-optimization. Evasion by machine code de-optimization. Contribute to EgeBalci/deoptimizer development by creating an account on GitHub.

The new version is out ๐ŸŽ‰ Version v0.1.2 is capable of simple control flow tracing. Now, it can find possible code paths and automatically skip dead offsets.
github.com/EgeBalci/deo...

1 year ago 0 0 0 0
Post image Post image

I built myself a couple of #Meshtastic nodes ๐Ÿ˜Š I got up to 22km of range with a 443 MHz Heltec V3. Hit me up if you're near. Node names: FAP1, FAP2 (MQTT enabled).

1 year ago 1 0 0 0
Post image

Added to the collection ๐Ÿฅฐ #flareon10

1 year ago 0 0 0 0
Preview
GitHub - EgeBalci/deoptimizer: Machine code de-optimizer. Machine code de-optimizer. . Contribute to EgeBalci/deoptimizer development by creating an account on GitHub.

New tool drop! ๐Ÿ”ฅ๐Ÿ”ฅ de-optimizer uses several mathematical approaches for mutating machine code instructions to their functional equivalents. Very good for bypassing rule-based detection without using any RWE memory. github.com/EgeBalci/deo...

1 year ago 0 0 0 0
Talks 2024 - Insomni'hack

Attention to all AV evasion enthusiasts! ๐Ÿšจ๐Ÿšจ I'll be talking about how to bypass security products by de-optimizing x86 binaries at Insomni'hack. See you all at Lausanne ๐Ÿ‘‹ #INSO24 www.insomnihack.ch/talks-2024/?...

2 years ago 0 0 0 0
Post image

Oops ๐Ÿ˜† #Lockbit

2 years ago 0 0 0 0
Preview
Release v2.0.1 ยท EgeBalci/sgn WarningDue to some difficulties of compiling keystone library, only Linux (amd64) binary is statically linked. Other release binaries still require keystone dynamic libraries on the system. Cha...

SGN v2.0.1 is out! ๐Ÿ”ฅ๐ŸŽŠ๐ŸŽ‰ Here are the changelogs:
- Register value preserving (-safe option) related bug fixes
- Random register selection bug fixed
- Better argument parsing
- Major code refactoring

github.com/EgeBalci/sgn...

2 years ago 0 0 0 0
Post image

Some TAs are using Github issues to target repo owners with crypto scams. Github notification mails are guaranteed to reach your inbox, bypassing any spam filters and security products. The content of the scam is very basic, but I can give points for creativity for sure :)

2 years ago 0 0 0 0
Preview
GitHub - qsocket/qs-netcat Contribute to qsocket/qs-netcat development by creating an account on GitHub.

QSocket v0.0.6-beta released ๐Ÿ”ฅ๐ŸŽŠ๐ŸŽ‰
- New websocket based knock protocol
- QSRN moved behind Cloudflare CDN
- Multi session support
- Better traffic forwarding capabilities
- Terminal QR code generation on deploy

github.com/qsocket/qs-n...

2 years ago 0 0 0 0
Advertisement
Post image

Finished #flareon10 in 69th place this year. ๐ŸŽ‰๐ŸŽ‰ It was definitely the hardest year. I had so much fun and agony at the same time. Next year's goal is to top 30.

2 years ago 1 0 0 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Dibs on CVE-2023-32560 ๐Ÿ”ฅ I have added the Ivanti Avalanche MDM buffer overflow (DEP bypass) exploit this week. ๐ŸŽ‰๐ŸŽ‰ I'll take a break from writing N-days until the end of Flareon. www.rapid7.com/blog/post/20...

2 years ago 0 0 0 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Added two more ZDI exploits this week ๐ŸŽ‰๐ŸŽ‰ VMware vRealize Log Insight RCE module was very interesting, it chains together tree vulnerabilities for code execution.
www.rapid7.com/blog/post/20...

2 years ago 2 0 1 0
Preview
Sandbox Escape in vm2@3.9.19 via custom inspect function Sandbox Escape in vm2@3.9.19 via custom inspect function - vm2_3.9.19_sandbox_escape_2.md

I was reading the PoC for the CVE-2023-37903 NodeJS sandbox escape, and I remembered that box-js was also using vm2 for emulation. Escape is looking very easy; I suggest you don't use emulation on analysis until the update. ยฏ\_(ใƒ„)_/ยฏ gist.github.com/leesh3288/e4...

2 years ago 0 0 0 0
Post image

I was able to write 10+ RCE exploits last month just by following ZDI and CVE feeds. Ended up at No. 1 on the Metasploit contributions last month ๐Ÿ˜

2 years ago 0 0 0 0

If you canโ€™t reproduce the bug, you simply need to do more reversing. At the end, the prize is guaranteed; you're not wasting your time. This could be a very good starting point for beginners. There are a lot of critical vulnerabilities being disclosed without a proper exploit.

2 years ago 0 0 1 0

Iโ€™ve realized that Iโ€™m having much more fun writing N-day exploits than doing vuln research. It takes MUCH LESS time and equally sharpens your skills, maybe even more. Writing N-days with just a brief CVE description is very much like solving a CTF challenge.

2 years ago 1 0 1 1
Advertisement
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Added another ZDI exploit this week, more on the way ๐ŸŽ‰ www.rapid7.com/blog/post/20...

2 years ago 1 0 0 0

Ivanti Avalance making a lot of hackers happy nowadays ๐Ÿ˜

2 years ago 0 0 0 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

+2 this week. Lets goo! ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ
www.rapid7.com/blog/post/2023/08/18/met...

2 years ago 1 0 0 0
Post image

It's that time of the year again :(

2 years ago 0 0 0 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

use exploits/multi/http/rudder_server_sqli_rce ๐ŸŽ‰๐ŸŽ‰

www.rapid7.com/blog/post/2023/08/04/met...

2 years ago 2 0 0 0