-
Accurately assess capability requirements for offensive operations, examining trade-offs between time & effort of approaches and planning an offensive toolkit (design, features, documentation, logging, etc)
-
Perform fine-grained manipulations on processes & memory (e.g. manually loading PE32/32+ files, COFF files + more in pure no_std Rust)
-
Write custom blue-pill Hypervisors and Kernel rootkits as part of our advanced module development section
-
Create completely custom Rust-based tooling that contains both our own custom designed approach to techniques, but also cherry-picks useful techniques seen in APTs or commercial toolkits (all completely implemented ourselves in Rust, no copy-pasting code) while accounting for weaknesses identified in certain external toolkits
-
Deep-dive into EDRs and AVs, actively reversing samples to identify gaps and understand its operations at the code level, gaining an in-depth understanding how it integrates into the OS