winterknife 🌻
@_winterknife_
low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜 | R&D @BHinfoSecurity | infosec.exchange/@winterknife
ID: 870829423645388800
https://lampreylabs.com 03-06-2017 02:28:08
528 Tweet
3,3K Followers
4,4K Following
Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own Markus Wulftange who loves converting n-days to 0-days code-white.com/blog/wsus-cve-…
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at Out of Bounds. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…
Many tradeoffs exist in managing the flow of offensive cyber capabilities. Winnona 💾, James Shires, JD Work, Michele Campobasso, et al. Dive into Access-as-a-Service markets and how it shapes these transactions in atlanticcouncil.org/in-depth-resea…
First blogpost in a while, check it out! PoC is a Crystal Palace shared library, format inspired by Rasta Mouse's LibTP x.com/AlmondOffSec/s…
Publishing github.com/SAERXCIT/LibTP…! It's a generalisation of LibTPLoadLib to proxy APIs with an arbitrary number of args. Provided as a Crystal Palace shared library. API made compatible with Rasta Mouse 's LibTP. Hooks are provided to show off the newest Crystal Palace features
New on the blog: Michael Barclay revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃 preludesecurity.com/blog/rehabilit…