5pider(@C5pider) 's Twitter Profileg
5pider

@C5pider

wannabe dev | vx

ID:1114558827133898757

linkhttp://5pider.net calendar_today06-04-2019 16:01:46

2,6K Tweets

27,0K Followers

78 Following

Ido Veltzman(@Idov31) 's Twitter Profile Photo

I'm pleased to announce that I will be giving my talk 'Kernel Games: The ballad of offense & defense' in /ˈziːf-kɒn/ this year, I hope to see you all there 🥳

account_circle
MalDev Academy(@MalDevAcademy) 's Twitter Profile Photo

Update 10 out now!
1.Patchless Threadless Injection Via Hardware Breakpoints

2.Tampered Syscalls

3.Exploiting EDRs for Evasion - Preventing EDR From Taking Action

4.Exploiting EDRs for Evasion - EDR LOLBINs

Update 11 next:
1. Introduction to BoF

2. Writing BoF Files

3. BoF

account_circle
mimicatz(@0xclient) 's Twitter Profile Photo

One of the issues i learned from today that when we write a custom GetProcAddress we will face the a little optimization issue which it's Forwarded Functions

account_circle
Ido Veltzman(@Idov31) 's Twitter Profile Photo

After a long time, the 6th and final part of Lord Of The Ring0 is here: idov31.github.io/posts/lord-of-…
In this part, the focus will be on kernel mode and user mode memory interaction, look into how attaching process work, and writing an AMSI bypass driver

account_circle
eversinc33 🩸🗡️(@eversinc33) 's Twitter Profile Photo

New blogpost and small tool release: Wrote a naive anti-rootkit driver that detects mapped drivers, and talk about some bypasses for those detections in part I of my new (anti-)-anti-rootkit series.

More research on rootkit evasion coming soon : )

eversinc33.com/posts/anti-ant…

account_circle
5pider(@C5pider) 's Twitter Profile Photo

really interesting blog post about another way of designing implants and agents. reminds me of metasploit railgun :D
blog post looks promising

account_circle
SapientFlow(@sapientflow) 's Twitter Profile Photo

My first ever blog post is out:
medium.com/@sapientflow/f…

Happy for any constructive criticism or anyone that just wants to engage on the topic.

account_circle
Protexity(@Protexity) 's Twitter Profile Photo

We are happy to share a guest blog post by Steve S! Steve is a Marine veteran, graduate student, and offensive security developer. He is currently Associate Staff at Datalytica where he spearheads the development of counter-AI capabilities.protexity.com/post/going-nat…

account_circle
alden(@birchb0y) 's Twitter Profile Photo

been spending a lot of time looking at macOS security internals recently

found that XPR binaries contain ~75 of apple's spiciest YARA rules looking for malware like SimpleTea and TriangleDB 🥵

as always, binja made the whole process super easy :)

alden.io/posts/secrets-…

account_circle