YOLOP0wn (@yolop0wn) 's Twitter Profile
YOLOP0wn

@yolop0wn

redteamer

ID: 4121793149

calendar_today05-11-2015 20:15:01

25 Tweet

312 Takipçi

157 Takip Edilen

kmkz (@kmkz_security) 's Twitter Profile Photo

Here - we - go ! Fun is starting here -> chapter 2 of our "feedback from battlefield" blog series is now online :) ictexpertsluxembourg.lu/technical-corn… #redteam #offensive #security #cybersecurity

Munich Cyber Tactics, Techniques and Procedures (@mcttp_con) 's Twitter Profile Photo

We are extremely excited to announce our first speakers for our MCTTP conference! We are looking forward to the talks by kmkz + YOLOP0wn Oddvar Moe Marcello #mcttp23 #infosec #pentest #redteam #ciso mcttp.de

kmkz (@kmkz_security) 's Twitter Profile Photo

Talk is over now, we (YOLOP0wn and I) hope you enjoyed it 😀 Big up to Munich Cyber Tactics, Techniques and Procedures ! Waiting for the slides/video of our "EDR vs Bad guys, a never ending story" talk to be on line? You can already start to play: github.com/YOLOP0wn/POSTD… github.com/YOLOP0wn/EchoD…

YOLOP0wn (@yolop0wn) 's Twitter Profile Photo

Checkout the new postdump version inclusive indirect syscalls, procexp ppl bypass, and asr bypass ! github.com/YOLOP0wn/POSTD…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Just finished the talk "Playing Chess as Red-Teams" Munich Cyber Tactics, Techniques and Procedures! 🔥 Time to release my PoC to avoid Kernel Callback / ETWti triggered memory scans for process injection - Caro-Kann: github.com/S3cur3Th1sSh1t…

Just finished the talk "Playing Chess as Red-Teams"  <a href="/MCTTP_Con/">Munich Cyber Tactics, Techniques and Procedures</a>! 🔥 Time to release my PoC to avoid Kernel Callback / ETWti triggered memory scans for process injection - Caro-Kann:

github.com/S3cur3Th1sSh1t…
kmkz (@kmkz_security) 's Twitter Profile Photo

Curious about one of our R&D project regarding TPM and Bitlocker encryption ? 👇👇 post-cyberlabs.github.io/Offensive-secu…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today. en.r-tec.net/r-tec-blog-byp…

Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today.

en.r-tec.net/r-tec-blog-byp…
YOLOP0wn (@yolop0wn) 's Twitter Profile Photo

Inspired by TrustedSec article on remotely starting Windows services, enjoy our python unauthenticated EFS trigger developed with Hypnoze Enjoy! github.com/Hypnoze57/rpc2…

Enes Şakir Çolak (@enessakircolak) 's Twitter Profile Photo

Windows 11 24h-2 Kernel Exploitation eneio64.sys LPE PoC Task traversal is one of my favorite techniques. I hope everyone like it as me :) Reach the blog at the link below -> lnkd.in/dD6gKV3E #Windows #Kernel #Exploit #win11 #24h2 #kernelexploit #windowskernel

Windows 11 24h-2 Kernel Exploitation
eneio64.sys LPE PoC

Task traversal is one of my favorite techniques. I hope everyone like it as me :)

Reach the blog at the link below -&gt;
lnkd.in/dD6gKV3E

#Windows #Kernel #Exploit #win11 #24h2 #kernelexploit #windowskernel