<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="https://esnbl0ckdev.github.io/feed.xml" rel="self" type="application/atom+xml" /><link href="https://esnbl0ckdev.github.io/" rel="alternate" type="text/html" /><updated>2026-05-15T12:16:01+00:00</updated><id>https://esnbl0ckdev.github.io/feed.xml</id><title type="html">Darkesn Re</title><subtitle>Nighthawk is an advanced redteam toolkit, built with operational security in mind.</subtitle><author><name>mdseclabs</name></author><entry><title type="html">Extending Nighthawk with Python Modules</title><link href="https://esnbl0ckdev.github.io/extending-nighthawk-with-python-modules/" rel="alternate" type="text/html" title="Extending Nighthawk with Python Modules" /><published>2026-02-05T00:00:00+00:00</published><updated>2026-02-05T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/extending-nighthawk-with-python-modules</id><content type="html" xml:base="https://esnbl0ckdev.github.io/extending-nighthawk-with-python-modules/"><![CDATA[<p>Nighthawk 0.4 introduced a powerful Python module system that allows operators to extend the implant’s capabilities using pure Python without modifying the core codebase.</p>

<p>Python modules run within an embedded interpreter inside the agent, enabling rapid development of custom post-exploitation capabilities while maintaining the operational security guarantees of the core framework.</p>

<h2 id="usage">Usage</h2>

<p>Modules can interact with the Nighthawk API surface to perform tasks such as credential harvesting, lateral movement, and situational awareness — all within the existing C2 channel.</p>

<div class="language-python highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="kn">import</span> <span class="n">nighthawk</span>

<span class="k">def</span> <span class="nf">run</span><span class="p">(</span><span class="n">agent</span><span class="p">):</span>
    <span class="n">results</span> <span class="o">=</span> <span class="n">agent</span><span class="p">.</span><span class="nf">shell</span><span class="p">(</span><span class="sh">"</span><span class="s">whoami</span><span class="sh">"</span><span class="p">)</span>
    <span class="n">agent</span><span class="p">.</span><span class="nf">log</span><span class="p">(</span><span class="n">results</span><span class="p">)</span>
</code></pre></div></div>

<h2 id="loading-modules">Loading Modules</h2>

<p>Modules are loaded via the operator console using the <code class="language-plaintext highlighter-rouge">python-load</code> command, followed by the path to the module file.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="PYTHON" /><category term="C2" /><category term="REDTEAM" /><summary type="html"><![CDATA[Nighthawk 0.4 introduced a powerful Python module system that allows operators to extend the implant’s capabilities using pure Python without modifying the core codebase.]]></summary></entry><entry><title type="html">Nighthawk 0.4 – Janus</title><link href="https://esnbl0ckdev.github.io/janus/" rel="alternate" type="text/html" title="Nighthawk 0.4 – Janus" /><published>2025-09-24T00:00:00+00:00</published><updated>2025-09-24T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/janus</id><content type="html" xml:base="https://esnbl0ckdev.github.io/janus/"><![CDATA[<h2 id="introduction">Introduction</h2>

<p>If you’ve been following our trajectory over the past 12 months, you will have noticed some of the significant design and architecture changes we’ve been making. The largest of which was the full rewrite of the backend teamserver and introduction of JSON RPC APIs. One of the key drivers for these changes was to pre-position the framework for what we’re releasing in Nighthawk 0.4.</p>

<h2 id="open-for-business">Open For Business</h2>

<p>Red Team Operations are multi-faceted, and adaptability is a key requirement for ensuring continued success. With Nighthawk 0.4, we introduced a new feature we’re labelling “Open Agent” — another Nighthawk first for commercial C2s. Open Agent allows you to develop and integrate your own agents, whether complete agents or stage 1s, into Nighthawk.</p>

<p>At minimum, Open Agents must implement the following three tasking commands:</p>

<ul>
  <li><code class="language-plaintext highlighter-rouge">CPMT_GET_DETAILED_INFO</code>: Allows the backend to obtain basic information about the machine.</li>
  <li><code class="language-plaintext highlighter-rouge">CPMT_GET_CONFIG</code>: Allows the backend to know the sleep and fragmentation settings.</li>
  <li><code class="language-plaintext highlighter-rouge">CPMT_TERMINATE_PROCESS</code>: Allows the operator to instruct the agent to terminate its own execution.</li>
</ul>

<h2 id="taking-center-stage">Taking Center Stage</h2>

<p>Complementing our Open Agent feature, in 0.4 we introduced a suite of new staging tools dubbed the <strong>Stager Kit</strong>. This suite comprises NHStager, a Builder, Visual Studio code templates and a new OpSec-driven loader.</p>

<p>NHStager supports a minimal set of commands including <code class="language-plaintext highlighter-rouge">whoami</code>, <code class="language-plaintext highlighter-rouge">ps</code>, <code class="language-plaintext highlighter-rouge">execute-bof</code>, <code class="language-plaintext highlighter-rouge">inject</code>, <code class="language-plaintext highlighter-rouge">ls</code>, <code class="language-plaintext highlighter-rouge">upload</code>, <code class="language-plaintext highlighter-rouge">download</code>, and more. It comes with a built-in BOF loader with full support for the Cobalt Strike BOF API.</p>

<h2 id="nhconfigurator">NHConfigurator</h2>

<p>NHConfigurator is a UI-based wizard that allows operators to cherry pick which high-level OpSec configuration options they want, while automatically creating random beacon network profiles and producing nginx <code class="language-plaintext highlighter-rouge">location</code> rules.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.4" /><category term="C2" /><category term="REDTEAM" /><category term="ADVERSARY SIMULATION" /><summary type="html"><![CDATA[Introduction]]></summary></entry><entry><title type="html">Automating Operations with Nighthawk</title><link href="https://esnbl0ckdev.github.io/automating-operations/" rel="alternate" type="text/html" title="Automating Operations with Nighthawk" /><published>2025-09-19T00:00:00+00:00</published><updated>2025-09-19T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/automating-operations</id><content type="html" xml:base="https://esnbl0ckdev.github.io/automating-operations/"><![CDATA[<p>This post covers how operators can leverage Nighthawk’s scripting capabilities to automate repetitive tasks during red team engagements, freeing operators to focus on higher-order decision making.</p>

<p>Automation workflows can be triggered by events within the C2 — such as a new beacon checking in, a specific hostname matching a pattern, or a time-based schedule.</p>

<h2 id="example-auto-enumerate-on-check-in">Example: Auto-enumerate on check-in</h2>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>on beacon_checkin {
  if hostname matches "DC*" {
    run enumerate-dc
  }
}
</code></pre></div></div>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="C2" /><category term="REDTEAM" /><category term="AUTOMATION" /><summary type="html"><![CDATA[This post covers how operators can leverage Nighthawk’s scripting capabilities to automate repetitive tasks during red team engagements, freeing operators to focus on higher-order decision making.]]></summary></entry><entry><title type="html">Nighthawk 0.3.4 – Sivako</title><link href="https://esnbl0ckdev.github.io/sivako/" rel="alternate" type="text/html" title="Nighthawk 0.3.4 – Sivako" /><published>2025-09-02T00:00:00+00:00</published><updated>2025-09-02T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/sivako</id><content type="html" xml:base="https://esnbl0ckdev.github.io/sivako/"><![CDATA[<p>Sivako is a maintenance release focusing on stability, performance improvements, and operator quality-of-life enhancements across the console and teamserver components.</p>

<p>Bug fixes and minor improvements are detailed in the operator changelog distributed with the release package.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.3.4" /><category term="C2" /><category term="REDTEAM" /><summary type="html"><![CDATA[Sivako is a maintenance release focusing on stability, performance improvements, and operator quality-of-life enhancements across the console and teamserver components.]]></summary></entry><entry><title type="html">Nighthawk 0.3.3 – Evanesco</title><link href="https://esnbl0ckdev.github.io/evanesco/" rel="alternate" type="text/html" title="Nighthawk 0.3.3 – Evanesco" /><published>2024-11-29T00:00:00+00:00</published><updated>2024-11-29T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/evanesco</id><content type="html" xml:base="https://esnbl0ckdev.github.io/evanesco/"><![CDATA[<p>Evanesco introduces enhanced process injection techniques and improvements to the sleep masking subsystem, improving survivability against modern endpoint detection solutions.</p>

<p>The release also includes a number of bug fixes reported by operators during engagements.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.3.3" /><category term="C2" /><category term="REDTEAM" /><summary type="html"><![CDATA[Evanesco introduces enhanced process injection techniques and improvements to the sleep masking subsystem, improving survivability against modern endpoint detection solutions.]]></summary></entry><entry><title type="html">Nighthawk 0.3 – Automate All The Things</title><link href="https://esnbl0ckdev.github.io/automate-all-the-things/" rel="alternate" type="text/html" title="Nighthawk 0.3 – Automate All The Things" /><published>2024-01-15T00:00:00+00:00</published><updated>2024-01-15T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/automate-all-the-things</id><content type="html" xml:base="https://esnbl0ckdev.github.io/automate-all-the-things/"><![CDATA[<p>Nighthawk 0.3 marks a significant milestone in the framework’s automation capabilities. This release introduces a comprehensive scripting layer that allows operators to automate complex multi-step operations.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.3" /><category term="C2" /><category term="REDTEAM" /><category term="AUTOMATION" /><summary type="html"><![CDATA[Nighthawk 0.3 marks a significant milestone in the framework’s automation capabilities. This release introduces a comprehensive scripting layer that allows operators to automate complex multi-step operations.]]></summary></entry><entry><title type="html">Nighthawk 0.2.6 – Three Wise Monkeys</title><link href="https://esnbl0ckdev.github.io/three-wise-monkeys/" rel="alternate" type="text/html" title="Nighthawk 0.2.6 – Three Wise Monkeys" /><published>2023-06-10T00:00:00+00:00</published><updated>2023-06-10T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/three-wise-monkeys</id><content type="html" xml:base="https://esnbl0ckdev.github.io/three-wise-monkeys/"><![CDATA[<p>Three Wise Monkeys focuses on stealth — see no evil, hear no evil, speak no evil. This release brings significant improvements to Nighthawk’s ability to evade detection at the network, memory, and process levels.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.2.6" /><category term="C2" /><category term="REDTEAM" /><category term="OPSEC" /><summary type="html"><![CDATA[Three Wise Monkeys focuses on stealth — see no evil, hear no evil, speak no evil. This release brings significant improvements to Nighthawk’s ability to evade detection at the network, memory, and process levels.]]></summary></entry><entry><title type="html">Nighthawk 0.2.4 – Taking Out the Trash</title><link href="https://esnbl0ckdev.github.io/taking-out-the-trash/" rel="alternate" type="text/html" title="Nighthawk 0.2.4 – Taking Out the Trash" /><published>2023-02-20T00:00:00+00:00</published><updated>2023-02-20T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/taking-out-the-trash</id><content type="html" xml:base="https://esnbl0ckdev.github.io/taking-out-the-trash/"><![CDATA[<p>This release focuses on cleanup — removing technical debt, hardening the communication channel, and patching operator-reported bugs that had accumulated since 0.2.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.2.4" /><category term="C2" /><category term="REDTEAM" /><summary type="html"><![CDATA[This release focuses on cleanup — removing technical debt, hardening the communication channel, and patching operator-reported bugs that had accumulated since 0.2.]]></summary></entry><entry><title type="html">Nighthawk - With Great Power Comes Great Responsibility</title><link href="https://esnbl0ckdev.github.io/with-great-power-comes-great-responsibility/" rel="alternate" type="text/html" title="Nighthawk - With Great Power Comes Great Responsibility" /><published>2022-10-05T00:00:00+00:00</published><updated>2022-10-05T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/with-great-power-comes-great-responsibility</id><content type="html" xml:base="https://esnbl0ckdev.github.io/with-great-power-comes-great-responsibility/"><![CDATA[<p>With the continued growth of the offensive security tooling ecosystem, we felt it important to write about our philosophy around responsible disclosure, customer vetting, and the ethical considerations that govern how we develop and distribute Nighthawk.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="C2" /><category term="REDTEAM" /><category term="OPSEC" /><summary type="html"><![CDATA[With the continued growth of the offensive security tooling ecosystem, we felt it important to write about our philosophy around responsible disclosure, customer vetting, and the ethical considerations that govern how we develop and distribute Nighthawk.]]></summary></entry><entry><title type="html">Nighthawk 0.2.1 – Haunting Blue</title><link href="https://esnbl0ckdev.github.io/haunting-blue/" rel="alternate" type="text/html" title="Nighthawk 0.2.1 – Haunting Blue" /><published>2022-06-15T00:00:00+00:00</published><updated>2022-06-15T00:00:00+00:00</updated><id>https://esnbl0ckdev.github.io/haunting-blue</id><content type="html" xml:base="https://esnbl0ckdev.github.io/haunting-blue/"><![CDATA[<p>Haunting Blue introduces a suite of new evasion primitives and expands Nighthawk’s lateral movement capabilities, with improved support for token manipulation and credential access.</p>]]></content><author><name>mdseclabs</name></author><category term="NIGHTHAWK" /><category term="0.2.1" /><category term="C2" /><category term="REDTEAM" /><summary type="html"><![CDATA[Haunting Blue introduces a suite of new evasion primitives and expands Nighthawk’s lateral movement capabilities, with improved support for token manipulation and credential access.]]></summary></entry></feed>