

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://blog.entysec.com/</id>
  <title>EntySec Blog</title>
  <subtitle>Latest EntySec security researches, news and tutorials.</subtitle>
  <updated>2026-01-10T17:35:01+00:00</updated>
  <author>
    <name>EntySec</name>
    <uri>https://blog.entysec.com/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://blog.entysec.com/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://blog.entysec.com/"/>
  <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator>
  <rights> © 2026 EntySec </rights>
  <icon>/assets/img/favicons/favicon.ico</icon>
  <logo>/assets/img/favicons/favicon-96x96.png</logo>


  
  <entry>
    <title>Building HatSploit Reverse HTTP Handler</title>
    <link href="https://blog.entysec.com/posts/building-reverse-http-handler/" rel="alternate" type="text/html" title="Building HatSploit Reverse HTTP Handler" />
    <published>2026-01-10T00:00:00+00:00</published>
  
    <updated>2026-01-10T00:00:00+00:00</updated>
  
    <id>https://blog.entysec.com/posts/building-reverse-http-handler/</id>
    <content type="text/html" src="https://blog.entysec.com/posts/building-reverse-http-handler/" />
    <author>
      <name>enty8080</name>
    </author>

  
    
    <category term="Development" />
    
  

  <summary>In offensive security development, communication between a listener (the “C2” or Command &amp;amp; Control) and an implant is the most critical link. While raw TCP shells are common, HTTP is often the preferred choice because it effortlessly blends into legitimate web traffic and bypasses restrictive firewalls.  Today, I’m walking through the implementation of a custom Reverse HTTP Handler and Sess...</summary>

  </entry>

  
  <entry>
    <title>Building the "Ghost in Machine" - The Assembly HTTP Reverse Shell</title>
    <link href="https://blog.entysec.com/posts/http-reverse-shell/" rel="alternate" type="text/html" title="Building the &amp;quot;Ghost in Machine&amp;quot; - The Assembly HTTP Reverse Shell" />
    <published>2026-01-05T00:00:00+00:00</published>
  
    <updated>2026-01-10T17:33:45+00:00</updated>
  
    <id>https://blog.entysec.com/posts/http-reverse-shell/</id>
    <content type="text/html" src="https://blog.entysec.com/posts/http-reverse-shell/" />
    <author>
      <name>enty8080</name>
    </author>

  
    
    <category term="Payloads" />
    
  

  <summary>In the world of offensive security, the “Reverse Shell” is often considered the ultimate primitive. It represents the moment where abstract exploitation becomes tangible control. Traditionally, reverse shells are written in Python, Bash, or C — languages that offer convenience, portability, and rapid development. However, those same conveniences come at a cost: predictability.  To truly evade m...</summary>

  </entry>

  
  <entry>
    <title>Baking Perfect Shellcode - Recipe for Real Hackers</title>
    <link href="https://blog.entysec.com/posts/baking-shellcodes/" rel="alternate" type="text/html" title="Baking Perfect Shellcode - Recipe for Real Hackers" />
    <published>2026-01-05T00:00:00+00:00</published>
  
    <updated>2026-01-07T00:42:12+00:00</updated>
  
    <id>https://blog.entysec.com/posts/baking-shellcodes/</id>
    <content type="text/html" src="https://blog.entysec.com/posts/baking-shellcodes/" />
    <author>
      <name>enty8080</name>
    </author>

  
    
    <category term="Payloads" />
    
  

  <summary>“Most developers spend their careers building things up. We’re here to break them down — with style. Writing shellcode is the culinary art of exploitation: it requires precision, the removal of impurities, and the ability to work in a kitchen that wasn’t built for you. In this guide, we’re ditching the store-bought libraries and baking a raw, null-free payload from scratch. Grab your apron and ...</summary>

  </entry>

  
  <entry>
    <title>iOS Modern Malware Persistence</title>
    <link href="https://blog.entysec.com/posts/ios-malware-persistence/" rel="alternate" type="text/html" title="iOS Modern Malware Persistence" />
    <published>2024-01-03T00:00:00+00:00</published>
  
    <updated>2024-12-03T00:52:37+00:00</updated>
  
    <id>https://blog.entysec.com/posts/ios-malware-persistence/</id>
    <content type="text/html" src="https://blog.entysec.com/posts/ios-malware-persistence/" />
    <author>
      <name>enty8080</name>
    </author>

  
    
    <category term="Post-Exploitation" />
    
  

  <summary>Your browser does not support the video tag. Here is a     link to the video file instead.         Since the development of SeaShell iOS post-exploitation framework started, I was thinking about persistence techniques that can be  applicable to a non-jailbroken (or jailbroken but rootless) iOS systems. So, after few days of brainstorming I came with few ideas that can be used and that I have al...</summary>

  </entry>

  
  <entry>
    <title>SeaShell - iOS 16/17 Remote Access</title>
    <link href="https://blog.entysec.com/posts/seashell-ios-malware/" rel="alternate" type="text/html" title="SeaShell - iOS 16/17 Remote Access" />
    <published>2023-12-31T00:00:00+00:00</published>
  
    <updated>2026-01-10T17:33:29+00:00</updated>
  
    <id>https://blog.entysec.com/posts/seashell-ios-malware/</id>
    <content type="text/html" src="https://blog.entysec.com/posts/seashell-ios-malware/" />
    <author>
      <name>enty8080</name>
    </author>

  
    
    <category term="Post-Exploitation" />
    
  

  <summary>Introduction  iPhones have a reputation for robust security, largely thanks to the extensive hardware security features they incorporate. As one of the world’s most widely-used and secure mobile operating systems, iOS consistently attracts the attention of hackers. A notable example of this is the sophisticated ‘Operation Triangulation’ attack discovered by Kaspersky. With each new version, App...</summary>

  </entry>

</feed>


