Name: Patrick Sacchet
Type: User
Company: Nightwing
Bio: Interests include reverse engineering, malware recognition and classification, and defensive/offensive exploitative capabilities primarily on Windows platforms.
Location: Annapolis Junction, MD
Blog: www.patricksacchet.com
Patrick Sacchet's Projects
Common payloads written in C# using Microsoft's .NET library
A 'mock' antivirus program that will scan for 'malware' using Yara signature definitions
In this personal project I aim to create a Python Script that can automatically email my team members their training at the start of each day
Software Engineering Final Project
A few different rudimentary covert channels I developed during my coursework at JHU. Each varies by technique and protocol in an attempt to conceal data transmission and receipt by malicious actors inside a target network.
Following the takedown of popular music bots (ie Groovy) there was a large demand from friends for a new bot that could still play music in our Discord server. VibeBot is my attempt at a solution for this problem. I aim to enable music playback on popular websites including: Spotify, Soundcloud and Youtube. This bot will be hosted on a Raspberry Pi, run as a background process via nohup. Additional features will be added as requested.
Repository for Software Development for Real-Time Embedded Systems graduate class coursework at JHU
Rudimentary loader techniques that can be used to load payloads in-memory rather than writing to disk for execution.
Loyola University Maryland code storage for image recognition / interop
Create and register our own COM object on a target machine with implemented malicious functionality.
CS486 (Computer Graphics) Final Project
Notes about interesting things, to primarily focus on Windows internals
Low-level rootkit development techniques targeted towards the Windows kernel
Variety of scripts for different purposes. Written primarily in Python/Shell/Batch.
Simple Blackjack Game Developed for Android Devices
Various common malicious programming technique samples for use in a wide variety of circumstances.
Creating and hosting my own website off my Raspberry Pi
An access and survey tool that relies on traditional authentication protocols (NTLM, Kerberos etc.) to remotely authenticate with a target and utilize Distributed Component Object Model (DCOM) methods to remotely collect off target.
Relying on Windows fundamentals to create a rudimentary Remote Access Tool (RAT) via Microsoft's C++ Windows API for target operations and Python for our C2 server
Reverse engineering binaries built from https://github.com/pjsacchet/Windows-RAT
Utilize Server Message Block (SMB) protocol to enable remote operations on Windows targets using traditional Windows APIs for functionality and Pythons scripting for CLI
Malware Signature Project implemented using YARA