boflint is a new tool designed to make the BOF development lifecycle smoother by analyzing BOFs for common errors before running it in an implant.| Outflank
Read about all the latest Outflank releases, including brand new features to OST's toolset, and updates to current offerings.| Outflank
Dig into secure enclave internals and learn about practical techniques used to exploit a read-write primitive in a vulnerable enclave DLL.| Outflank
Learn the anatomy of Virtualization-Based Security (VBS) enclaves, their internals, and the unique ways they could be leveraged for offensive operations on Windows systems.| Outflank
The OST user community on Slack provides access to Outflank experts, peer-to-peer learning, and influences future releases.| Outflank
OST is an expertly developed set of offensive security tools designed for advanced red ream engagements. Request a demo today.| Outflank
Outflank Security Tooling is a broad set of evasive red team tools that cover every significant step in the attacker kill chain, from initial breach to data exfiltration. Request a demo or quote.| Outflank
Details macOS and Linux telemetry sources, exploring endpoint security products to understand their capabilities and identify weaknesses.| Outflank
For avoiding EDR userland hooks, there are many ways to cook an egg: Direct system calls (syscalls), Indirect syscalls, unhooking, hardware breakpoints, and bringing and loading your own version of a library. These methods each have advantages and disadvantages. When developing a C2 implant it’s nice to work with a combination of multiple of these. For instance, you could use a strong (in)direct syscall library for direct usermode to kernel transition, then use unhooking or hardware breakpo...| Outflank