Raphael Mudge
@raphaelmudge.bsky.social
š¤ 286
š„ 17
š 237
Riding around in the breeze. Security Thinker. Hacker. USAF Veteran.
https://aff-wg.org
The work under way: PIC programs (loader, capability) become a reusable & empty base. PIC service modules control bootstrapping. merge and: attach (incept Win32 API calls), redirect (N:1 layering), C modular programming (1:1 interface+implementation) populates that base with tradecraft specifics
add a skeleton here at some point
4 days ago
1
4
0
reposted by
Raphael Mudge
_RastaMouse
4 days ago
[BLOG] PICing AOP - a summary of the latest Crystal Palace commands for Aspect-Oriented Programming.
rastamouse.me/picing-aop/
loading . . .
PICing AOP
The 11.10.25 Crystal Palace release added more new commands in one go than I think I've seen thus far. Many of them seemed really similar at first blush, and it took me a while to get an understanding...
https://rastamouse.me/picing-aop/
0
6
2
Tradecraft Engineering with Aspect-Oriented Programming
@rastamouse.me
pretty much predicted what was coming in his last blog post. attach (Win32 APIs), redirect (local funcs), capability right-sized IAT hooks, and PICO function exports. Yes, attach can incept its PIC.
aff-wg.org/2025/11/10/t...
loading . . .
Tradecraft Engineering with Aspect-Oriented Programming
Itās 2025 and apparently, Iām still a Java programmer. One of the things I never liked about Javaās culture, going back many years ago, was the tendency to hype frameworks that seemed to over-enginā¦
https://aff-wg.org/2025/11/10/tradecraft-engineering-with-aspect-oriented-programming/
13 days ago
0
10
10
reposted by
Raphael Mudge
14 days ago
I've updated
github.com/pard0p/PICO-...
to execute indirect syscalls via LibTP + an enhanced version of LibGate. I hope this helps to demonstrate the utility of shared libraries in Crystal Palace projects š
loading . . .
GitHub - pard0p/PICO-Implant: PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible...
PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible to build a multi-stage...
https://github.com/pard0p/PICO-Implant/
0
3
1
reposted by
Raphael Mudge
17 days ago
PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible to build a multi-stage and modular C2 implant made of PICOs.
github.com/pard0p/PICO-...
loading . . .
GitHub - pard0p/PICO-Implant: PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible...
PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible to build a multi-stage...
https://github.com/pard0p/PICO-Implant
0
4
4
"I did give a heads up to Elastic before publishing this post. They have taken this technique into account and are working on updates to the detection rules to catch this." "Provided as a Crystal Palace shared library. Format inspired by
@rastamouse.me
's LibTP. " Ground truth security research.
add a skeleton here at some point
18 days ago
0
4
2
4 of the ~37 links in
@badsectorlabs.com
Last Week in Security are Tradecraft Garden related. LibIPC, LibGate, Arranging the PIC Parterre, & TCG's Community Pavilion.
@pard0p.bsky.social
dropped a WinHTTP shared library today.
blog.badsectorlabs.com/last-week-in...
Thank you for building with me.
loading . . .
Last Week in Security (LWiS) - 2025-11-03
ShareHound (@podalirius_), Conquest C2 (@virtualloc), Docker Compose path traversal (@RonMasas), dead domain discovery (@_lauritz_), Narrator persistence/lat movement (@Oddvarmoe ), Windows 11 LPE (@d...
https://blog.badsectorlabs.com/last-week-in-security-lwis-2025-11-03.html
19 days ago
0
11
0
reposted by
Raphael Mudge
19 days ago
LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to facilitate the development of PICO modules that require HTTP/HTTPS transport layer communication.
github.com/pard0p/LibWi...
loading . . .
GitHub - pard0p/LibWinHttp: LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to facilitate the development of PICO...
LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to facilitate the development of PICO modules that require HTT...
https://github.com/pard0p/LibWinHttp
0
3
3
reposted by
Raphael Mudge
22 days ago
LibIPC is a simple Crystal Palace shared library for inter-process communication, based on Named Pipes.
github.com/pard0p/LibIPC
loading . . .
GitHub - pard0p/LibIPC: LibIPC is a simple Crystal Palace shared library for inter-process communication, based on Named Pipes.
LibIPC is a simple Crystal Palace shared library for inter-process communication, based on Named Pipes. - pard0p/LibIPC
https://github.com/pard0p/LibIPC
1
5
4
As new projects, blog posts, and other efforts around TCG show up, I'm listing them here:
tradecraftgarden.org/references.h...
I've put together a Friends of the Tradecraft Garden list on BlueSky too:
bsky.app/profile/did:...
Thank you for building, exploring, & teaching w/ this young project šŖ“
add a skeleton here at some point
25 days ago
0
12
4
reposted by
Raphael Mudge
_RastaMouse
25 days ago
I've also updated Crystal Loaders to benefit from some of the new CP features
github.com/rasta-mouse/...
loading . . .
GitHub - rasta-mouse/Crystal-Loaders: A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike - rasta-mouse/Crystal-Loaders
https://github.com/rasta-mouse/Crystal-Loaders/
0
2
2
reposted by
Raphael Mudge
_RastaMouse
25 days ago
LibGate - a Crystal Palace shared library for resolving and performing syscalls
github.com/rasta-mouse/...
loading . . .
GitHub - rasta-mouse/LibGate: A Crystal Palace shared library to resolve & perform syscalls
A Crystal Palace shared library to resolve & perform syscalls - rasta-mouse/LibGate
https://github.com/rasta-mouse/LibGate
1
12
2
reposted by
Raphael Mudge
_RastaMouse
27 days ago
Quick blog post that explores some of the problems (that I had) that this update has helped solve, and where I see it potentially going in the future.
rastamouse.me/arranging-th...
add a skeleton here at some point
0
2
1
reposted by
Raphael Mudge
26 days ago
@raphaelmudge.bsky.social
, thanks to Crystal Palace I just published a proof-of-concept of a self-cleaning, in-memory PICO loader.
github.com/pard0p/Self-...
loading . . .
GitHub - pard0p/Self-Cleaning-PICO-Loader: Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload execution.
Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload execution. - pard0p/Self-Cleaning-PICO-Loader
https://github.com/pard0p/Self-Cleaning-PICO-Loader
0
2
1
Tradecraft Gardenās PIC Parterre Dynamic Function Resolution pt. 2, Say yes to the .bss, and symbol remapping.
aff-wg.org/2025/10/27/t...
loading . . .
Tradecraft Gardenās PIC Parterre
The goal of Tradecraft Garden is to separate evasion tradecraft from C2. Part of this effort involves looking for logical lines of separation. And, with PIC, I think weāve just found one of them. Tā¦
https://aff-wg.org/2025/10/27/tradecraft-gardens-pic-parterre/
28 days ago
0
7
4
"Kuba Gretzky wanted to make the internet safer. Instead, he helped make it more dangerous."
therecord.media/evilginx-kub...
loading . . .
Evilginxās creator reckons with the dark side of red-team tools
Polish developer Kuba Gretzky wanted to prove that multi-factor authentication wasnāt foolproof. He succeeded ā maybe too well. What happens when a cybersecurity warning becomes the threat itself?
https://therecord.media/evilginx-kuba-gretzky-interview-click-here-podcast
about 1 month ago
0
4
1
reposted by
Raphael Mudge
Calzone
about 1 month ago
LibCPLTest: A shared library for Crystal Palace that allows you to unit test your PICOs. It's nothing too fancy, just a few helper functions and a macro, but it's helped me to create a consistent framework for testing my PIC capabilities.
github.com/ofasgard/Lib...
loading . . .
GitHub - ofasgard/LibCPLTest: A shared library for Crystal Palace that allows you to unit test your PICOs.
A shared library for Crystal Palace that allows you to unit test your PICOs. - ofasgard/LibCPLTest
https://github.com/ofasgard/LibCPLTest
0
2
3
I want to point out a few things happening with this fledgling Tradecraft Garden ecosystem. Right now things. But, how I see them in context of the overall model this could become.
about 1 month ago
1
5
4
Penalty Notice Capita Plc by UK ICO Detailed breach analysis after 2023 ransomware attack. £14M fine. Which standards of care weren't met? * Understaffed SOC (1 analyst/shift) * 58hr SOC response vs. 4.5hr AD takeover * Failure to implement Active Directory tiering.
ico.org.uk/media2/pv5nh...
about 1 month ago
0
3
3
Why plant a Tradecraft Garden? April 2025, I talked to my camera about how tradecraft may go the route we saw vuln research go years ago, red teaming's retreat to self-protective secrecy, and the opportunity I see for a public tradecraft ecosystem. This starts @ 1:16:00
vimeo.com/1074106659#t...
loading . . .
Post-ex Weaponization: An Oral History
This is "Post-ex Weaponization: An Oral History" by AFF-WG on Vimeo, the home for high quality videos and the people who love them.
https://vimeo.com/1074106659#t=4556
about 1 month ago
0
10
5
reposted by
Raphael Mudge
Calzone
about 1 month ago
The new Crystal Palace version is very cool. Having DFR in your PIC code and just providing a resolver function is so much more ergonomic than having two different mechanisms for resolving APIs! I love it - already updated my HWB PICO to incorporate the new functionality.
0
2
2
reposted by
Raphael Mudge
_RastaMouse
about 1 month ago
My first Crystal Palace shared library!
github.com/rasta-mouse/...
loading . . .
GitHub - rasta-mouse/LibTP: Crystal Palace library for proxying Nt API calls via the Threadpool
Crystal Palace library for proxying Nt API calls via the Threadpool - rasta-mouse/LibTP
https://github.com/rasta-mouse/LibTP
1
8
1
reposted by
Raphael Mudge
_RastaMouse
about 1 month ago
I'm legit blown away. We can use DFR with Nt* APIs now!
0
6
1
Weeding the Tradecraft Garden
aff-wg.org/2025/10/13/w...
Dynamic Function Resolution for PIC(?!?), rewriting x86 PIC to fix pointers, and a shared library concept for PICOs/PIC
loading . . .
Weeding the Tradecraft Garden
When I started work on Crystal Palace, my initial thought was to see how much I could ease development of position-independent code DLL capability loaders using the tools and manipulations possibleā¦
https://aff-wg.org/2025/10/13/weeding-the-tradecraft-garden/
about 1 month ago
1
9
5
reposted by
Raphael Mudge
_RastaMouse
about 1 month ago
[Crystal Kit] Evasion kit for Cobalt Strike.
github.com/rasta-mouse/...
loading . . .
GitHub - rasta-mouse/Crystal-Kit: Runtime evasion for Cobalt Strike
Runtime evasion for Cobalt Strike. Contribute to rasta-mouse/Crystal-Kit development by creating an account on GitHub.
https://github.com/rasta-mouse/Crystal-Kit
0
5
3
reposted by
Raphael Mudge
Calzone
about 2 months ago
I've been obsessed with
@raphaelmudge.bsky.social
's Crystal Palace since I learned about it at Beacon earlier this month, so... here's a WIP PICO I wrote to hook functions with hardware breakpoints š
github.com/ofasgard/har...
loading . . .
GitHub - ofasgard/hardware-breakpoint-pico: A PICO for Crystal Palace that implements hardware breakpoint hooking.
A PICO for Crystal Palace that implements hardware breakpoint hooking. - ofasgard/hardware-breakpoint-pico
https://github.com/ofasgard/hardware-breakpoint-pico
0
6
1
I'll unpack a few thoughts on this...
add a skeleton here at some point
about 2 months ago
1
4
1
Analysis of a Ransomware Breach
aff-wg.org/2025/09/26/a...
Breach analysis? Breach intelligence? Industry critique? Fee-only ransomware negotiator? 100% efficacy? The story of how Microsoft worked an old problem, fucked it up, we malign the guy who told us, they fixed it, and it wasn't fixed? PtH?
about 2 months ago
0
14
7
reposted by
Raphael Mudge
Red Siege
2 months ago
Our CEO
@timmedin.bsky.social
offers his thoughts on what exactly led to the Ascension breach in this follow-up article from Ars Technica:
arstechnica.com/security/202...
#hacking
#infosec
#cybersecurity
loading . . .
How weak passwords and other failings led to catastrophic breach of Ascension
A deep-dive into Active Directory and how āKerberoastingā breaks it wide open.
https://arstechnica.com/security/2025/09/how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension/
0
4
3
reposted by
Raphael Mudge
_RastaMouse
2 months ago
[BLOG] I wrote a short post on using the Crystal Palace API from an external Java program.
rastamouse.me/crystal-pala...
loading . . .
Crystal Palace API
Crystal Palace provides two command-line tools, called link and piclink, which are used with a specification file to combine a reflective loader with one or more capabilities (DLLs and/or COFFs). lin...
https://rastamouse.me/crystal-palace-api/
0
5
1
""I'm also interested in looking at the Java API a bit more to see how one might build a merged capability in a more progammatic fashion (imagine a GUI where you configure & build a capability by checking/unchecking "features" to include in the final output).""
add a skeleton here at some point
2 months ago
0
1
2
reposted by
Raphael Mudge
Tim Medin
2 months ago
In response to Senator Ron Wyden's letter to the FTC, I have put together my comments on Kerberoasting and RC4.
redsiege.com/blog/2025/09...
loading . . .
https://redsiege.com/blog/2025/09/kerberoasting-microsoft-and-a-senator/
1
10
3
COFFing out the Night Soil
aff-wg.org/2025/09/10/c...
A COFF-focused Crystal Palace update: * internal COFF normalization & section group merging * Crystal Palace can now export COFF * I added COFF merging to the spec language too Linker stuff.
loading . . .
COFFing out the Night Soil
Iām back with another update to the Tradecraft Garden project. Again, this release is focused on the Crystal Palace linker. My priority in this young project is to build the foundation first, then ā¦
https://aff-wg.org/2025/09/10/coffing-out-the-night-soil/
2 months ago
0
11
6
reposted by
Raphael Mudge
Tim Medin
2 months ago
The issue isn't as much RC4 as it is bad passwords. While RC4 isn't good, other encryption does *not* prevent Kerberoasting. AES128 and AES256 just slow down the attack by ~100-170x. If the password is really bad, 170x is meaningless.
@matthewdgreen.bsky.social
arstechnica.com/security/202...
loading . . .
Senator blasts Microsoft for making default Windows vulnerable to āKerberoastingā
Wyden says default use of RC4 cipher led to last yearās breach of health giant Ascension.
https://arstechnica.com/security/2025/09/senator-blasts-microsoft-for-making-default-windows-vulnerable-to-kerberoasting/
1
4
1
If you're in London, Will Burgess (
x.com/joehowwolf
) is speaking at Beacon %25 on "Linkers and Loaders: Experiments with Crystal Palace" this Thursday.
www.eventbrite.co.uk/e/beacon-25-...
beac0n.org
From his X: "If you enjoy filthy PIC tradecraft it may be of interest!"
loading . . .
Beacon %25
The fourth year of Beacon: London's home of hackers, hunters and EDR dodgers.
https://www.eventbrite.co.uk/e/beacon-25-tickets-1438391440519
3 months ago
0
7
5
@hdm.io
A Pirate's Guide to Snake Oil & Security (May 2025)
www.runzero.com/resources/pi...
""So I spent most of my life doing vulnerability research in some form... this is an area I've spent a whole too much of my life caring about and I feel like it's not in a great state today""
loading . . .
NSEC Keynote: A Pirate's Guide to Snake Oil & Security
Watch HD Moore's keynote at NSEC, where you are taken on a satirical voyage through the crowded world of vulnerability management.
https://www.runzero.com/resources/pirates-guide-to-snake-oil-security/
3 months ago
1
6
0
Server Outage: My OSS project websites (e.g., Tradecraft Garden, Sleep, etc.) are down due to a maintenance window at my VPS host. They're working it.
3 months ago
1
4
0
reposted by
Raphael Mudge
Greg Otto
4 months ago
Jen Easterly writes a post on LinkedIn addressing her position at West Point being rescinded: "A casualty of casually manufactured outrage that drowned out the quiet labor of truth and the steady pulse of integrity."
www.linkedin.com/pulse/harder...
loading . . .
The Harder Right
I spent 25 years in uniform, including four as a cadet at the United States Military Academy at West Point and two and a half more teaching economics and national security at West Pointās Department o...
https://www.linkedin.com/pulse/harder-right-jen-easterly-hi1be/
2
47
39
I just updated my 25+ year old IRC client, jIRCii. Curious about Aggressor Script's ancestor? It's here. Update improves IRC over SSL/TLS UX, fixes some bugs, tightens some screws, and fixes build to compile on OpenJDK 10+.
jircii.dashnine.org/download/
CC
@hagiagraphe.bsky.social
loading . . .
jIRCii - Java IRC Client
jIRCii is a fully scriptable internet relay chat client for Windows, MacOS X, and Linux. It's free too
https://jircii.dashnine.org
4 months ago
3
6
1
reposted by
Raphael Mudge
_RastaMouse
4 months ago
Published a small collection of PIC loaders for Cobalt Strike, based on my experiments with Crystal Palace.
github.com/rasta-mouse/...
loading . . .
GitHub - rasta-mouse/Crystal-Loaders: A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike - rasta-mouse/Crystal-Loaders
https://github.com/rasta-mouse/Crystal-Loaders
0
4
2
reposted by
Raphael Mudge
_RastaMouse
4 months ago
[BLOG] Here's the post - I demonstrate my QoL improvements for working with the TCG codebase. This includes vscode with intellisense support, and producing debug builds for use in WinDbg.
rastamouse.me/debugging-th...
add a skeleton here at some point
1
4
2
@rastamouse.me
digging more into Crystal Palace and demonstrates some of the cross-linking possibilities. I'll admit, I got a little nerd-sniped here, because I'm *not* thinking greatly about "the" way to decompose a complex/modular capability (e.g., a C2 agent). Thread below has my thoughts...
add a skeleton here at some point
4 months ago
1
5
0
I loved this keynote. But, also felt sadness. Where there is tribe and purpose in our uniqueness in the "hacker community"--there's also a capacity & indifference for cruelty to each other too. I liken it to a smiling group with cannibals present. Room goes dark. Someone disappears. No one cares why
add a skeleton here at some point
4 months ago
0
0
0
I fixed the login required on my PIC fundamentals Vimeo video. In this go around, I'm experimenting with keeping control of my online content (e.g., no GitHub/YouTube, I pay to host it, etc.) Less algorithm spread, but ideally easier to access w/o ads. Back fired this time. I'm learning as I go.
4 months ago
0
4
0
reposted by
Raphael Mudge
_RastaMouse
4 months ago
Hooking arbitrary BOFs via
@raphaelmudge.bsky.social
's Crystal Palace is very cool. I'm going to explore more to see if I can rip out the SleepMask and BeaconGate into their own PICOs, rather than using the official BOF codebases.
1
5
1
Position Independent Code (PIC) Development Crash Course. My July 2025 overview of PIC writing fundamentals. Don't know why jump tables are bad? Got a __chkstk relocation error? Watch this video.
#GoodLuckAndHappyHacking
vimeo.com/1100089433/d...
loading . . .
PIC Development Crash Course
Some helpful content for writing position independent code.
https://vimeo.com/1100089433/d38da198ba?share=copy
4 months ago
0
9
5
A debate is when two parties, with different perspectives, are on a shared journey to truth. Bad Faith communication, can look like debate, but is a quest to dominate, silence, win, and shut down examination of uncomfortable truths that benefit one party.
consilienceproject.org/the-endgames...
loading . . .
The Endgames of Bad Faith Communication - The Consilience Project
https://consilienceproject.org/the-endgames-of-bad-faith-communication/
4 months ago
0
4
0
Taking them to the SHITTER: an analysis of vendor abuse of security research in-the-wild
aff-wg.org/2025/07/13/t...
(There is no benefit modulating my voice for anyone's comfort. This is my fair take, but unapologetic truth. This phenomena has gone unchecked for too long)
4 months ago
1
10
7
Well, latest blog post went live. I tried to schedule for tomorrow, but ended up setting the date to last week. Valid mistake :) So blog subscribers got the content already (although wrong permalink to actual post). So, it's live. I'll come up with something clever to promote it here tomorrow.
4 months ago
0
6
0
Load more
feeds!
log in