This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://x.com/UnderdogWNBA/status/2034245315797082303 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "legalnoticecaption" -Value "Your Title Here" | |
| Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "legalnoticetext" -Value "Your message body here. Unauthorized access is prohibited." |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| encoders.py | |
| XOR (single-byte, rolling) and RC4 encoding implementations. | |
| These are intentionally simple — mirrors real-world malware tradecraft. | |
| """ | |
| def xor_single_byte(data: bytes, key: int = 0x41) -> bytes: | |
| """Single-byte XOR. Trivial but still common in commodity malware.""" | |
| return bytes(b ^ key for b in data) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" ` | |
| /target:library ` | |
| /reference:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Build.Framework.dll" ` | |
| /out:C:\Temp\TestLogger.dll ` | |
| C:\Temp\TestLogger.cs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://derek-site-2026-6g03r9taz-derek-martins-projects.vercel.app/about/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| MSB-04: Atypical File — .csproj with Inline Task from Legitimate-Looking | |
| Path | |
| Objective: | |
| Determine whether the detection signal can identify a malicious .csproj containing an inline C# task even | |
| when the file resides in a directory that mimics a normal development workspace (complete with a .sln file). | |
| This tests content-based detection rather than path-based heuristics. MSB-01 through MSB-03 already | |
| validate detection from suspicious locations (C:\Temp). This test flips the scenario — the path looks | |
| legitimate, but the content is malicious. | |
| Steps: | |
| 1. Create a realistic project directory: mkdir C:\Source\MyProject\src |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| using Microsoft.Build.Framework; | |
| using System; | |
| using System.IO; | |
| // Benign test logger — writes to a temp file to prove execution | |
| // Implements ILogger which MSBuild loads via /logger: switch | |
| public class TestLogger : ILogger | |
| { | |
| public LoggerVerbosity Verbosity { get; set; } | |
| public string Parameters { get; set; } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <Target Name="TestTarget"> | |
| <TestTask /> | |
| </Target> | |
| <UsingTask | |
| TaskName="TestTask" | |
| TaskFactory="CodeTaskFactory" | |
| AssemblyFile="C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll"> | |
| <Task> | |
| <Code Type="Fragment" Language="cs"> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <Target Name="TestTarget"> | |
| <TestTask /> | |
| </Target> | |
| <UsingTask | |
| TaskName="TestTask" | |
| TaskFactory="CodeTaskFactory" | |
| AssemblyFile="C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll"> | |
| <Task> | |
| <Using Namespace="System.IO" /> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # MSBuild.exe Detection Signal — Purple Team Testing Plan | |
| **Classification:** Internal — PCSIRT / Red Team Use Only | |
| **Author:** Red Team Operations | |
| **Date:** February 2026 | |
| **Version:** 1.0 | |
| ----- | |
| ## 1. Objective |
NewerOlder