APTzatziki (@gekarantzas) 's Twitter Profile
APTzatziki

@gekarantzas

George Karantzas. - Est. 2001. - BSc Student@UniPi. - Sr. Dev@Morphisec - Opinions are my own.

ID: 1231778705271410689

calendar_today24-02-2020 03:11:53

1,1K Tweet

1,1K Followers

2,2K Following

âśž inversecos (@inversecos) 's Twitter Profile Photo

How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀 I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗inversecos.com/2025/02/an-ins…

How the NSA (Equation Group) allegedly hacked into China's Polytechnical University đź‘€

I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group.

🔗inversecos.com/2025/02/an-ins…
Mickey Jin (@patch1t) 's Twitter Profile Photo

New 0 day dropped: jhftss.github.io/Parallels-0-da… Conclusion: 1. Don’t trust Trend Zero Day Initiative , they are too late to handle our reports. One of my reports was submitted in 2024 Jan, but it is still not disclosed to the vendor. No reply from the ZDI yet! 2. Don’t trust the Parallels security!

Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest article, laxa revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminates writing files to disk, significantly reducing the likelihood of triggering security alerts. Read the details at synacktiv.com/publications/l….

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch has released DelphiHelper, a plugin for #IDAPro that aids in analyzing Delphi binaries. Check it out on ESET’s GitHub: github.com/eset/DelphiHel…. Proud to be recognized among the notable submissions of the 2024 Hex-Rays SA Plugin Contest: hex-rays.com/blog/2024-plug…

#ESETresearch has released DelphiHelper, a plugin for #IDAPro that aids in analyzing Delphi binaries. Check it out on ESET’s GitHub: github.com/eset/DelphiHel…. Proud to be recognized among the notable submissions of the 2024 <a href="/HexRaysSA/">Hex-Rays SA</a> Plugin Contest: hex-rays.com/blog/2024-plug…
MrAle98 (@mrale_98) 's Twitter Profile Photo

Developed an exploit for CVE-2025-21333 (quite unreliable): vulnerability in vkrnlintvsp.sys. Exploit code: github.com/MrAle98/CVE-20… Exploits a paged pool overflow overwriting a _IOP_MC_BUFFER_ENTRY*. Hope you find it useful in case not already shown🙂.

Alfie (@alfiecg_dev) 's Twitter Profile Photo

I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy! alfiecg.uk/2025/03/01/Tri…

Rad (@rad9800) 's Twitter Profile Photo

My recent talk on Windows Ransomware Detection is now up on YouTube. We explore the various aspects, detection vectors in products such as malicious vss usage/canary files/etc. and issues. We explore evasion and discuss a gaping hole in all products. youtu.be/5t67BFcC-MQ

starlabs (@starlabs_sg) 's Twitter Profile Photo

STAR Labs Windows Exploitation Challenge Writeup We're happy to announce that Frost solved our recent Windows exploitation challenge & earned a ticket to Off-By-One Conference ! 🎉 Full writeup here: starlabs.sg/blog/2025/03-s… Thank you to everyone who participated!

Elastic Security Labs (@elasticseclabs) 's Twitter Profile Photo

Join Cyril F. and #ElasticSecurityLabs in exposing ABYSSWORKER, a malicious driver that silences #EDR tools and is distributed via the MEDUSA #ransomware. Get the deep details: go.es.io/4bFKnr5

hasherezade (@hasherezade) 's Twitter Profile Photo

A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/unp… - automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims

Archie (@archie_1997) 's Twitter Profile Photo

ETW is an incredibly powerful tool in the wrong hands. Just finished writing about how it allows drivers to hook context switches on Windows 11 24H2 while remaining PatchGuard and HVCI compatible: archie-osu.github.io/etw/hooking/20…

Archie (@archie_1997) 's Twitter Profile Photo

Dug into Riot Vanguard's kernel driver's dispatch table hooks. The article took an unexpected turn half way through, as I found some not yet documented stuff, such as the complete list of system calls hooked by the driver. Article link: archie-osu.github.io/2025/04/11/van…

Archie (@archie_1997) 's Twitter Profile Photo

Getting code execution in a process that cannot be located using traditional kernel APIs and is untouchable from usermode? All while staying PatchGuard-friendly? Sign me up: archie-osu.github.io/2025/04/13/pow…

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Thread Execution Hijacking is one of the well-known methods that can be used to run implanted code. In this blog we introduce a new injection method, that is based on this classic technique, but much stealthier - Waiting Thread Hijacking. Read More : research.checkpoint.com/2025/waiting-t…

Catalyst Security (@catalystsec) 's Twitter Profile Photo

We're excited to announce the formation of Catalyst Security! We're a new company started by a small group of experienced vulnerability researchers, focused solely on innovative research. catalystsecurity.com

Matt Ehrnschwender (@m_alphaaa) 's Twitter Profile Photo

I made a CTF challenge a couple years ago which required decrypting Ekko sleep obfuscation from a memory dump. It had ~5 solves by the end of the CTF. Here's a writeup on it elvisblue.github.io/posts/nahamcon…