Initial Access
Open Source Loaders with Track Record of Successful Callbacks with Light Customization
This assumes that you're doing your due diligence check on potential detections using tools such as: ThreatCheck, Non-Distributed Checks (Kleenscan, Litterbox) and YARA.
Assumed Breach
Assuming control over a compromised laptop, there are two ways to get an initial C2 callback:
C2 Generated Shellcode + Custom Shellcode Runner/Process Injector
Last updated