adr (@aaaddress1) 's Twitter Profile
adr

@aaaddress1

Team Lead of PSIRT and Threat Research, TXOne Networks. Speaker at Black Hat USA, CODE BLUE, DEFCON, HITB, HITCON, S4, SECTOR. Author of Windows APT Warfare

ID: 2250198151

linkhttp://www.30cm.tw/ calendar_today17-12-2013 10:28:13

3,3K Tweet

2,2K Followers

554 Following

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Ask a DFIR analyst what they’d feel. They’d probably say: „Better an old Sysmon than no Sysmon at all.“ I’ve seen cases where the audit policy was completely blank but at least Sysmon with a decent config was installed. I‘ve seen a threat actor use old Sysmon for PrivEsc. In an

hasherezade (@hasherezade) 's Twitter Profile Photo

"Going Native - Malicious Native Applications" - by Protexity: protexity.com/post/going-nat… - interesting read about using applications with Subsystem: Native for offense

Chi-en (Ashley) Shen (@ashl3y_shen) 's Twitter Profile Photo

I'm excited to return to Black Hat USA this year and have the opportunity to give away one briefings pass to the conference. If you're a student or someone who could use a little support to attend, I'd love to hear from you. DM me if you're interested! #BHUSA

I'm excited to return to Black Hat USA this year and have the opportunity to give away one briefings pass to the conference. If you're a student or someone who could use a little support to attend, I'd love to hear from you. DM me if you're interested! 
#BHUSA
Mr. OS (@ksg93rd) 's Twitter Profile Photo

#exploit #Kernel_Security 1. CVE-2025-21204: Abusing the Windows Update Stack to Gain SYSTEM Access cyberdom.blog/abusing-the-wi… 2. Bypassing MTE with CVE-2025-0072 (Arm Mali GPU kernel code execution) github.blog/security/vulne… ]-> PoC: github.com/github/securit…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥 github.com/rtecCyberSec/B… No need to steal credentials, no impersonation, no injection needed 👌

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

I posted a short 9-minute video on using MCP with IDA for vulnerability analysis. It's open to YouTube members now and will go public on Tuesday. Thanks! youtu.be/ZFABxmJTm6Y I'm using Duncan Ogilvie 🍍's IDA MCP Server which is the best I've seen yet. github.com/mrexodia/ida-p…

x64dbg (@x64dbg) 's Twitter Profile Photo

We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] Starting Chrome Exploitation with Type Confusion 101 ^-^☆ Part 1.(EN) hackyboiz.github.io/2025/07/01/OUY… Ever wondered how Chrome's V8 engine actually runs JavaScript, and how those internals can lead to security issues like Type Confusion? In this post, I break down the V8

[Research] Starting Chrome Exploitation with Type Confusion 101 ^-^☆ Part 1.(EN)

hackyboiz.github.io/2025/07/01/OUY…

Ever wondered how Chrome's V8 engine actually runs JavaScript, and how those internals can lead to security issues like Type Confusion?
In this post, I break down the V8
Hacksparo 🥷👾 (@hack_sparo) 's Twitter Profile Photo

We’re cooked, guys. A new vulnerability has been discovered in sudo and you don’t even need to be in the sudo group to get root. I just tried it 👇

Smukx.E (@5mukx) 's Twitter Profile Photo

How I ruined my vacation by reverse engineering WSC. blog.es3n1n.eu/posts/how-i-ru… TLDR: This post will briefly describe the journey implementing defendnot, a tool that disables Windows Defender by using the Windows Security Center (WSC) service API directly.

How I ruined my vacation by reverse engineering WSC. 

blog.es3n1n.eu/posts/how-i-ru…

TLDR: This post will briefly describe the journey implementing defendnot, a tool that disables Windows Defender by using the Windows Security Center (WSC) service API directly.
immortalp0ny (@immortalp0ny) 's Twitter Profile Photo

Today we released write up about vulnerability that I found and which was patched recently in NTFS.sys CVE-2025-49689. Enjoy! swarm.ptsecurity.com/buried-in-the-…

Stephan Berger (@malmoeb) 's Twitter Profile Photo

During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands

During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit  

This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands
Matt Zorich (@reprise_99) 's Twitter Profile Photo

New in the Defender XDR advanced hunting platform, GraphApiAuditEvents - any blue team, threat hunter or those working on detections should make sure they get familiar with this data, it can be key for detecting malicious activity in your environment. It shows information about

Mr. Anthony 安東尼 (@darkfloyd1014) 's Twitter Profile Photo

Other than hacking and testing, if we target to make higher impact and attempt to make the test and results are more scalable and promising, we cannot avoid to work on engineering and software development. We have developed an enterprise-grade software called VXAI Suite, which

Other than hacking and testing, if we target to make higher impact and attempt to make the test and results are more scalable and promising, we cannot avoid to work on engineering and software development. 

We have developed an enterprise-grade software called VXAI Suite, which
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''GitHub - DosX-dev/obfus.h: Macro-header for compile-time C obfuscation (tcc, win x86/x64)'' #infosec #pentest #redteam #blueteam github.com/DosX-dev/obfus…

Mr. Anthony 安東尼 (@darkfloyd1014) 's Twitter Profile Photo

This time is a real thrilling announcement as our paper about template-based fuzzing for JavaScript engine is accepted in OOPSLA24-25. Thank you so much to every co-authors including Ken Wong, Dongwei Xiao, Dr. Daoyuan Wu Dr. Shuai Wang and Yiteng Peng. What a good evening!

This time is a real thrilling announcement as our paper about template-based fuzzing for JavaScript engine is accepted in OOPSLA24-25.

Thank you so much to every co-authors including  Ken Wong, Dongwei Xiao, Dr. Daoyuan Wu  Dr.  Shuai Wang  and Yiteng Peng.

What a good evening!
HITCON (@hacksintaiwan) 's Twitter Profile Photo

🚀 HITCON Cyber Range x CTF 2025|社群攤位強勢登場! 今年 HITCON Cyber Range x CTF 2025 不只帶來熱血攻防與實戰競賽,更集結多個資安社群與專業組織,從學生社群、開源推廣到專業認證,完整展現臺灣資安生態的多元面貌🔥

🚀 HITCON Cyber Range x CTF 2025|社群攤位強勢登場!

今年 HITCON Cyber Range x CTF 2025 不只帶來熱血攻防與實戰競賽,更集結多個資安社群與專業組織,從學生社群、開源推廣到專業認證,完整展現臺灣資安生態的多元面貌🔥