by The Ethical Hacking Guru | Mar 5, 2021 | C#, ConfuserEx, Redteam
In this tutorial, I cover how to use ConfuserEx and neo-ConfuserEx to bypass antivirus. It’s worth mentioning that ConfuserEx only obfuscates .NET assemblies (compiled C# programs). I will use ConfuserEx to obfuscate a compiled version of the SafetyKatz project....
by The Ethical Hacking Guru | Mar 4, 2021 | C#, Go
I played around with using csc /out:outfile.exe program.cs but the thing is you can use an executable or a DLL just the same using the Assembly.Load() method which comes with the System.Inflection namespace. This method does the following – Loads an assembly....
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go can be used by ethical hackers to run shellcode generated by Metasploit. That means you can use msfvenom to create shellcode that can be used by a go program to execute it. For this tutorial, I am using this project go-shellcode by brimstone on Github. First make...
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go is a popular tool for offensive programming these days. The antivirus vendors are still catching up to it since it is still a niche tool for ethical hacking purposes. In this tutorial you will learn how to write a Go program to open a new Notepad process. You will...
by The Ethical Hacking Guru | Feb 13, 2021 | Go
An application should be easy to use. You’ve heard it before, about the legacy app that was migrated, and now the guy who managed it is no longer around. No one knows how it works. This is how I use Cobra for easy Golang cli flags for all my apps that need it....
by The Ethical Hacking Guru | Jan 17, 2020 | Elm, Programming
Elm is a functional programming language. It compiles to javascript. It promises a couple things that you won’t find with javascript such as no runtime errors, helpful error messages, and reliable refactoring. We will make an Elm app based on the same structure...