WafflesExploits (Andre Oliveira)
@wafflesexploits.bsky.social
I’m a penetration tester with a strong passion for red teaming, malware development, and teaching.
Pinned
GitHub - WafflesExploits/hide-payload-in-images: A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be ret...
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
github.com
Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
GitHub - WafflesExploits/hide-payload-in-images: A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be ret...
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
github.com
February 16, 2025 at 10:25 AM
Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExplo...
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/posts/Hide_a...
Happy hacking! 😀
Automatically convert and upload Custom Queries from BloodHound Legacy to BloodHound CE
github.com/WafflesExplo...
#BloodHound #ActiveDirectory #RedTeam #InfoSec #CyberSecurity
#Pentesting #ADSecurity #SecurityTools #HackingTools #WindowsSecurity
github.com/WafflesExplo...
#BloodHound #ActiveDirectory #RedTeam #InfoSec #CyberSecurity
#Pentesting #ADSecurity #SecurityTools #HackingTools #WindowsSecurity
GitHub - WafflesExploits/Bloodhound-query-legacy2ce: A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to the API or...
A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to the API or save them to a file for later use. - WafflesExplo...
github.com
January 11, 2025 at 11:17 AM
Automatically convert and upload Custom Queries from BloodHound Legacy to BloodHound CE
github.com/WafflesExplo...
#BloodHound #ActiveDirectory #RedTeam #InfoSec #CyberSecurity
#Pentesting #ADSecurity #SecurityTools #HackingTools #WindowsSecurity
github.com/WafflesExplo...
#BloodHound #ActiveDirectory #RedTeam #InfoSec #CyberSecurity
#Pentesting #ADSecurity #SecurityTools #HackingTools #WindowsSecurity
Reposted by WafflesExploits (Andre Oliveira)
Concealing Payloads : Hiding Shellcode in Image Files with Python and C/C++ : wafflesexploits.github.io/posts/Hide_a...
github.com/WafflesExplo... credits @waflisan
github.com/WafflesExplo... credits @waflisan
December 19, 2024 at 1:37 AM
Concealing Payloads : Hiding Shellcode in Image Files with Python and C/C++ : wafflesexploits.github.io/posts/Hide_a...
github.com/WafflesExplo... credits @waflisan
github.com/WafflesExplo... credits @waflisan
Reposted by WafflesExploits (Andre Oliveira)
Dynamic HTTP(S) Stager Code
: wafflesexploits.github.io/posts/Dynami...
: wafflesexploits.github.io/posts/Dynami...
Dynamic HTTP(S) Payload Stager
A dynamic HTTP/s Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders.
wafflesexploits.github.io
December 19, 2024 at 3:22 AM
Dynamic HTTP(S) Stager Code
: wafflesexploits.github.io/posts/Dynami...
: wafflesexploits.github.io/posts/Dynami...
Concealing Payloads: Hiding Shellcode in Image Files with Python and C/C++
github.com/WafflesExplo...
github.com/WafflesExplo...
GitHub - WafflesExploits/hide-payload-in-images: A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be ret...
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
github.com
December 19, 2024 at 11:05 AM
Concealing Payloads: Hiding Shellcode in Image Files with Python and C/C++
github.com/WafflesExplo...
github.com/WafflesExplo...