waldoirc (@waldoirc) 's Twitter Profile
waldoirc

@waldoirc

Trying to figure out how computers work. Figuring out SDR, IOT, and Mobile exploitation.

github.com/waldo-irc

ID: 1102255026158952449

linkhttps://www.arashparsa.com calendar_today03-03-2019 17:10:51

552 Tweet

3,3K Takipçi

615 Takip Edilen

klez (@klezvirus) 's Twitter Profile Photo

[RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, result of a joint research on an original technique developed by namazso, done with my friends trickster0 and waldoirc. Enjoy! ;) github.com/klezVirus/Sile…

Cerbersec (@cerbersec) 's Twitter Profile Photo

New year, new tools! As part of my #KernelKarnage talk at SANS Offensive Operations #SANSPenTestHackFest back in November I'm happy to release: The CobaltWhispers Framework & Interceptor Kernel Driver! github.com/NVISOsecurity/… github.com/NVISOsecurity/…

john (@turbocodr) 's Twitter Profile Photo

About 5 years ago I started wondering if a malware C2 channel existed that embedded messages and data payloads inside the x509 cert used for the TLS handshake. I searched but never found this in the wild so this year I decided to write it myself. github.com/jconwell/secre…

Artur Marzano (@macmodsec) 's Twitter Profile Photo

lapinousexy waldoirc No amount of R&D is enough in security. If you have a quick look at most TTPs you will realize that most EDRs will cover most of the most dangerous ones, but will leave lots of gaps. Good examaples would be malicious browser extensions which most EDRs don't inspect properly.

thefLink (@theflinkk) 's Twitter Profile Photo

Here is a little ETW based tool to play with different IOCs by ImageLoad events. I feel like proxying Kernel32!LoadLibrary through Ntdll is a very strong IOC. :-) github.com/thefLink/Hunt-…

diversenok (@diversenok_zero) 's Twitter Profile Photo

The new Token Universe v0.5 can view and edit security descriptors on 30 types of securable objects. 🔥 It also knows how to handle complex ACLs with compound and callback ACEs, mandatory and trust labels, and more. Enjoy experimenting! github.com/diversenok/Tok…

The new Token Universe v0.5 can view and edit security descriptors on 30 types of securable objects. 🔥

It also knows how to handle complex ACLs with compound and callback ACEs, mandatory and trust labels, and more. Enjoy experimenting!

github.com/diversenok/Tok…
Will Schroeder (@harmj0y) 's Twitter Profile Photo

Being in this class is blowing my mind! The material is amazing and the instructors are crushing it. If you're interested in attacking AI/ML, you have to check out this course!

T3nb3w (@t3nb3w) 's Twitter Profile Photo

Just published a blog on the House of Force heap exploitation technique! Learned a ton about glibc's ptmalloc. Check it out! #HeapExploitation #vulnresearch mohamed-fakroud.gitbook.io/red-teamings-d…

Fabian (@testert01) 's Twitter Profile Photo

[Blogpost] EvtPsst a small EventLog Process Mute tool without OpenProcess call to the EventLog process. This blog shows how to elevate a SYNCHRONIZE handle to a full process handle with a process token of EventLog. nothingspecialforu.github.io/EvtPsstBlog/ #redteam

Joe (@trk_rdy) 's Twitter Profile Photo

Quarterly reminder that Defender for Endpoint (MDE) is not EDR. MDE is a logical grouping of many protections, EDR being one of the them. That is all.

T3nb3w (@t3nb3w) 's Twitter Profile Photo

🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research! 🔍 Blog: mohamed-fakroud.gitbook.io/red-teamings-d… 💻 Code: github.com/T3nb3w/ComDotN…

trickster0 (@trickster012) 's Twitter Profile Photo

This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…