DbgMan ^_^ (@0xdbgman) 's Twitter Profile
DbgMan ^_^

@0xdbgman

Just Dbgman Debugging stuff, breaking things, and fixing them again.

0xdbgman.github.io

ID: 1954500586935889920

link calendar_today10-08-2025 11:10:35

34 Tweet

829 Takipçi

208 Takip Edilen

DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

- Downgrading ci.dll and exploiting Windows Update (as demonstrated in a DEFCON session) - Bypassing DES - Bypassing Elastic and ETW-TI using a C2 - bypass EDR , MDE , win def #Maldev #ExploitDevelopment #WindowsInternals #DEFCON #EDR #BYOVD #evasion #ReverseEngineer #Redteam

- Downgrading ci.dll and exploiting Windows Update (as demonstrated in a DEFCON session)
- Bypassing DES
- Bypassing Elastic and ETW-TI using a C2
- bypass EDR , MDE ,  win def
 #Maldev #ExploitDevelopment #WindowsInternals #DEFCON #EDR  #BYOVD #evasion
#ReverseEngineer #Redteam
DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

Yo, a new blog about Red Team infra Likel : C2 , Redirectors, CDN Relays (Azure, AWS, GCP), Serverless Lambda, Cloudflare Tunnels, Phishing , Mail Servers, Malleable Profiles, and full OPSEC hardening 0xdbgman.github.io/posts/red-team… #APT #redteam #infrastructure #C2

DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

Yo , a new blog about all initial access teq Payload Dev | Phishing & MFA Bypass | Credential Attacks | App Exploitation | Social Engineering | Physical & Supply Chain Attacks 0xdbgman.github.io/posts/initial-… #RedTeam #Phishing #apt #InitialAccess #payloaddev

DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

Yo , a new blog post about persistence techniques Windows:Registry, Scheduled Tasks, WMI, DLL Hijacking Linux:cron, SSH Keys, LKM macOS: LaunchAgents, Dylib Hijacking Cloud: IAM Abuse, Kubernetes Inspired by Volt Typhoon, Lazarus Group, APT29. 0xdbgman.github.io/posts/persiste…

DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

Yo, a new Blog Post about Bypass All Sec Control in windows like (win def,applocker,WDAC,SmartScreen,ASR,PPL,Sysmon,Edrs) 0xdbgman.github.io/posts/sec-cont… #EDRS #Bypass #PPL #WDAC #Redteam #windowsDefender #ASR #Sysmon

DbgMan ^_^ (@0xdbgman) 's Twitter Profile Photo

Static Analysis for Windows Kernel Drivers using disassembly, symbolic execution,taint and Z3 to auto discover kernel vuln maps IOCTL , killer , ppl bypass surface, tracks user input to sensitive APIs, discovers ROP/JOP gadgets, and can even generate PoC exploits & fuzzers

Static Analysis for Windows Kernel Drivers using disassembly, symbolic execution,taint and Z3 to auto discover kernel vuln maps IOCTL , killer , ppl bypass surface, tracks user input to sensitive APIs, discovers ROP/JOP gadgets, and can even generate PoC exploits & fuzzers