jm33_ng
  • Cryptography
  • Ctf
  • Misc
  • Pentest
  • Programming
  • Tools
  • Vulnerabilities

jm33_ng


an infosec newbie's tech blog

Pure Memory Based Emp3r0r Agents

Date Tue 05 January 2021 Tags emp3r0r / linux / shellcode

banner

what does a (good) dropper do

happy new year again my fellow hackers

i started writing emp3r0r almost one whole year ago, and by now it has gained some popularity (not much, i know). to make it more popular, more features are being developed and added, in this article i …

View comments.

more ...

Make HTTP/2 Requests Via Proxy In Golang

Date Wed 15 July 2020 Tags HTTP2 / proxy / golang / emp3r0r

banner

my struggle

i was trying to implement proxy support in emp3r0r, but found that http2.Transport has no such option. the only option that might work is replacing DialTLS() function with a custom one

i did a lot of research:

  • x/net/http2: support http2 proxy connections
  • the dialer hack …

View comments.

more ...

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »

About jm33

Who

  • weaponizer / linux user / vimer / pythonist / gopher / gray hat / male / siscon / freak

Contact

  • Online CV

  • 3A5DBF07

  • Leave a message

  • Social

    • Twitter
    • LinkedIn
    • StackOverflow
    • Github
  • Recent Posts

    • emp3r0r - Process Injection And Persistence
    • emp3r0r - Break Out Of Internal Network
    • Pure Memory Based Emp3r0r Agents
    • Make HTTP/2 Requests Via Proxy In Golang
    • emp3r0r - 0x03
  • Tags

    • 443
    • active directory
    • ad
    • announcement
    • anonymity
    • antivirus
    • anyconnect
    • apache
    • assembly
    • baidu
    • blackhat
    • buffer overflow
    • C#
    • career
    • censorship
    • change
    • cisco
    • code maintainance
    • compton
    • Coursera
    • crypto
    • cryptography
    • ctf
    • CVE
    • CVE-2018-18955
    • CVE-2018-7750
    • dairy
    • Diary
    • DNS污染
    • DPI
    • email
    • emp3r0r
    • exploit
    • file transfer
    • gf
    • gfw
    • github
    • Glowing Bear
    • golang
    • google hacking
    • great wall
    • greatwall
    • hacking
    • hacking tool
    • HiWiFi
    • HTTP2
    • https
    • injection
    • IRC
    • 极路由
    • Joomla
    • KCP
    • kcptun
    • kernel
    • killer
    • lede
    • life
    • linux
    • linux kernel
    • lkm
    • local privilege escalation
    • log cleaner
    • login bypass
    • LPE
    • macos
    • mass exploit
    • mec
    • memory layout
    • mentohust
    • Misc
    • multi-threaded crawler
    • mysql
    • namespace
    • netcat
    • network
    • nic
    • nikto
    • nmap
    • obfs4
    • obfsproxy
    • ocserv
    • openwrt
    • OSIN
    • paramiko
    • pentest
    • pep8
    • PGP
    • php
    • pi
    • plan
    • port-forwarding
    • post-exploitation
    • privilege escalation
    • programming
    • project
    • proxy
    • ptrace
    • PTRACE_TRACEME
    • pythonic
    • QQ
    • quote
    • RCE
    • reverse shell
    • reversing
    • rootkit
    • router
    • s2-045
    • scanner
    • scramblesuit
    • SEED lab
    • shadowsocks
    • shadowsocks-plus
    • shellcode
    • skydog
    • smartphone
    • socket
    • sqli
    • sqlmap
    • SS
    • sshd
    • SSL
    • Stanford
    • sudo
    • systemd
    • Thomas Jefferson
    • TMUX
    • tools
    • Tor
    • trasparent proxy
    • vim
    • virtualbox
    • vpn
    • wayland
    • web
    • weechat
    • windows
    • windows domain
    • windows server
    • xfce4
    • xfwm
    • xhost
    • xml
    • xmpp
    • zoomeye

© 2021 jm33-ng - About this site

Creative Commons License Content licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where indicated otherwise.

Images hosted on this site are either my own or from Google Image Search