Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injectionchevron-right
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚔️Red Teamchevron-right
  2. Development

API Hashing

  • https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malwarearrow-up-right

  • https://www.huntress.com/blog/hackers-no-hashing-randomizing-api-hashes-to-evade-cobalt-strike-shellcode-detectionarrow-up-right

hashtag
Examples

  • https://github.com/helpsystems/nanodump/blob/main/scripts/randomize_sw2_seed.pyarrow-up-right

Last updated 3 years ago