Blog

Enhancing AtlasReaper

For red teamers, adaptability is everything. The ability to pivot…
15/01/2025/by Aldo Mihasi

Enhancing ScheduleRunner

In the arsenal of a red team operator, adaptability and stealth…
18/12/2024/by Aldo Mihasi

A Native Application Subsystem Backdoor

What is a Native Application?
Most Windows applications come…
03/12/2024/by Nick Aliferopoulos

Treading carefully in Share Enumeration

Wherever there's Windows in corporate environments, there are…
26/10/2023/by Nick Aliferopoulos

From traditional to templated malware

This is a follow-up article to Introducing Blueprint which was…
19/06/2023/by Nick Aliferopoulos

Introducing Blueprint

Blueprint is a python3 source-code level modular templating solution based on Jinja. It is developed by the Hackcraft Red Team and is open-source and freely available.
19/05/2023/by Nick Aliferopoulos
atlasreaper

Enhancing AtlasReaper

For red teamers, adaptability is everything. The ability to pivot quickly and exploit opportunities in dynamic environments is crucial. AtlasReaper, already a reliable ally in targeting Atlassian environments like Confluence and Jira, just became even more formidable. With the addition of BOF.NET-powered attachment downloading, this tool now offers capabilities tailored for stealth and efficiency in […]

schedulerunner

Enhancing ScheduleRunner

In the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]

native application

A Native Application Subsystem Backdoor

What is a Native Application? Most Windows applications come in two "flavors", GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable's PE header: There are actually quite a few Subsystem […]