Hai vaknin (@vakninhai) 's Twitter Profile
Hai vaknin

@vakninhai

Security Researcher
EAT-Sleep-Hack-Repeat
github.com/LuxNoBulIshit/

ID: 1255364346

calendar_today09-03-2013 21:06:48

104 Tweet

997 Takipçi

201 Takip Edilen

Hai vaknin (@vakninhai) 's Twitter Profile Photo

Embedding files in HTML with data URIs enables dropper/file smuggling techniques without relying on JavaScript. <a href="data:application/zip;base64,YOUR_BASE64_HERE"download="example.zip">Download ZIP File</a>

Embedding files in HTML with data URIs enables dropper/file smuggling techniques without relying on JavaScript.

&lt;a href="data:application/zip;base64,YOUR_BASE64_HERE"download="example.zip"&gt;Download ZIP File&lt;/a&gt;
tamir yehuda (@tamirye94) 's Twitter Profile Photo

Excited to share Hai vaknin and mine latest exploration into #AzureStorageAccounts! 🚀 Discover how Read/Write permissions can be exploited for privilege escalation & lateral movement. 🔗 tinyurl.com/azstorageaccou…

Dr. Anton Chuvakin (@anton_chuvakin) 's Twitter Profile Photo

ZOMG, I am seeing people who self-brand as "cybersecurity influencer" on LinkedIn... NON IRONICALLY. OMFG. How exactly we arrive here? :-)

Hai vaknin (@vakninhai) 's Twitter Profile Photo

Following my last tweet on Event 5007 about low-privileged users being able to see exclusion paths, I found something even cooler! Using MpCmdRun.exe -Scan -ScanType 3 -File "<path>" reveals if a path is excluded. If excluded, MpCmdRun.exe skips the scan and you get a popup. If

Following my last tweet on Event 5007 about low-privileged users being able to see exclusion paths, I found something even cooler! Using

MpCmdRun.exe -Scan -ScanType 3 -File "&lt;path&gt;"

reveals if a path is excluded. If excluded, MpCmdRun.exe skips the scan and you get a popup. If
Ido Naor 🇮🇱 (@idonaor1) 's Twitter Profile Photo

Eleven children killed while playing soccer Eleven children killed while playing soccer Eleven children killed while playing soccer Eleven children killed while playing soccer Eleven children killed while playing soccer Eleven children killed while playing soccer

Eleven children killed while playing soccer 
Eleven children killed while playing soccer
Eleven children killed while playing soccer
Eleven children killed while playing soccer 
Eleven children killed while playing soccer
Eleven children killed while playing soccer
Hai vaknin (@vakninhai) 's Twitter Profile Photo

Just found a new, smarter way to reveal Defender exclusion paths using MpCmdRun.exe-way better than the old Event Log 5700 method. Always cool to level up the game! 🔥 You can check it out on our new blog, Friends & Security: blog.fndsec.net #CyberSecurity

Just found a new, smarter way to reveal Defender exclusion paths using MpCmdRun.exe-way better than the old Event Log 5700 method. Always cool to level up the game! 🔥 You can check it out on our new blog, Friends &amp; Security: blog.fndsec.net
#CyberSecurity
Yehuda Smirnov (@yudasm_) 's Twitter Profile Photo

Excited to share a tool I've been working on - ShadowHound. ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them

Excited to share a tool I've been working on - ShadowHound.
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them
Hai vaknin (@vakninhai) 's Twitter Profile Photo

The last time PlayStation servers were down this long, millions of credit card details got stolen. Just saying… 🤔🎮

Hai vaknin (@vakninhai) 's Twitter Profile Photo

Excited to speak at Blue Hat IL 2025! I’ll be showcasing SharpExclusionFinder, a tool we built to uncover endpoint security exclusion paths without admin rights. Because sometimes, the best way to break security… is to just read what’s already there. 😏 See you there! 🔥

Excited to speak at Blue Hat IL 2025!

I’ll be showcasing SharpExclusionFinder, a tool we built to uncover endpoint security exclusion paths without admin rights. Because sometimes, the best way to break security… is to just read what’s already there. 😏

See you there! 🔥
Hai vaknin (@vakninhai) 's Twitter Profile Photo

CONTEXT-only injection No VirtualAllocEx. No WriteProcessMemory. We show how pure register-/stack manipulation can: Load a DLL with a pointer-only LoadLibrary call Spin up a remote thread via NtCreateThread that self-allocates & self-writes inside the target Chain APC-safe